Zur Modulseite PDF generieren

#40389 / #1

SS 2014 - SS 2014

English

Computer Security - Specialization Large
Computer Security - Vertiefung groß

9

Seifert, Jean-Pierre

Benotet

Portfolioprüfung

English

Zugehörigkeit


Fakultät IV

Institut für Softwaretechnik und Theoretische Informatik

34355100 FG S-Professur Security in Telecommunications (SecT)

Keine Angabe

Kontakt


TEL 16

Bauroth, Stephan

lehre@sect.tu-berlin.de

Lernergebnisse

The module’s qualification aims are to get to know theoretical basics and technical details of each lecture’s subject (Hardware Security, Foundations of Computer Security I & II or Cryptography for Security). Furthermore, showing examples matching the themes will motivate students to make practice use of what they just have learned. Those lectures are the foundation upon which project papers and theses can be based on. This course provides: Technical skills: 40% Method skills: 30% System skills: 15% Soft skills: 15%

Lehrinhalte

a) Hardware Security More and more powerful electronical devices and their applications, from mobiles, car infotainment, e-banking, electronic cash, internet via PC, mobile, gaming consoles or televisions to machine to machine communication are pervading our lives. In that context the requirements to these systems to ensure a secure and reliable program execution even in malicious environments are constantly increasing. These requirements can often be fulfilled with special hardware only. Modern CPUs and platforms provide with e.g. La Grande (Intel) and Trustzone (ARM) hardware extensions which make construction of such systems feasible. This lecture deals with existing modern security hardware and discusses their functions and principles. b) Foundations of Security The Foundations of Computer Security lecture aims to give a thorough introduction into the very diverse field of computer security from a theoretical point of view. The focus here is on such computer security aspects which can be precisely captured in a formal, logical, and mathematical way, and which allow moreover proofs of meaningful theorems in that field. Students of this course will learn how to think precisely about computer security against arbitrary attacks, a skill that will remain relevant and useful regardless of how technology and standards change. With just enough formalism to maintain precision and rigor without obscuring the development of ideas. We convey both the theories’ conceptual beauty and its relevance to practice. c) Cryptography for Security Over the past 30 years cryptography has been transformed from a mysterious art into a mathematically rigorous science. Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. This course provides a rigorous yet accessible treatment of modern cryptography, with a focus on definitions, precise assumptions, and rigorous proofs. We introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private key encryption and message authentication follows. We illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half focuses on public key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public key encryption and digital signatures, this lecture concludes with a discussion of the random oracle model and its applications. This course presents the necessary tools to fully understand this fascinating subject. d) Computer Security Seminar The Computer Security Seminar offered each semester deals with most recent subjects in respect of the latest state of research regarding Computer Security focusing Internet Security, Cryptography, Foundations of Security I & II, Hardware Security, Software Security, and Telecommunication Security.

Modulbestandteile

Compulsory area

Die folgenden Veranstaltungen sind für das Modul obligatorisch:

LehrveranstaltungenArtNummerTurnusSpracheSWS ISIS VVZ
Computer Security SeminarSEM0434 L 956WiSe/SoSeKeine Angabe2

Compulsory elective area

Aus den folgenden Veranstaltungen müssen 2 Veranstaltungen abgeschlossen werden.

LehrveranstaltungenArtNummerTurnusSpracheSWS ISIS VVZ
Cryptography for SecurityVL0434 L 964WiSe/SoSeKeine Angabe2
Foundations of Computer Security IVL0434 L 963WiSe/SoSeKeine Angabe2
Foundations of Computer Security IIVLWiSe/SoSeKeine Angabe2
HardwareSecurityVL0434 L 983WiSe/SoSeKeine Angabe2

Arbeitsaufwand und Leistungspunkte

Computer Security Seminar (SEM):

AufwandbeschreibungMultiplikatorStundenGesamt
1. Background Research1.020.0h20.0h
2. Written Report1.030.0h30.0h
3. Talk Preparation, Slides1.020.0h20.0h
4. Presence at Block Meetings4.05.0h20.0h
90.0h(~3 LP)

Cryptography for Security (VL):

AufwandbeschreibungMultiplikatorStundenGesamt
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)

Foundations of Computer Security I (VL):

AufwandbeschreibungMultiplikatorStundenGesamt
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)

Foundations of Computer Security II (VL):

AufwandbeschreibungMultiplikatorStundenGesamt
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)

HardwareSecurity (VL):

AufwandbeschreibungMultiplikatorStundenGesamt
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)
Der Aufwand des Moduls summiert sich zu 270.0 Stunden. Damit umfasst das Modul 9 Leistungspunkte.

Beschreibung der Lehr- und Lernformen

During the seminar students will work on a scientific subject individually writing a report and giving a talk in the end. We will especially focus on working with original literature as well as on practicing and preparing of technical talks. To ensure relevance and up-to-date subjects, usually the most interesting out of last year’s scientific articles are chosen. Having completed this course all students will have profound technical knowledge of each small and clearly defined subject. Course language is English (including all written works in the seminar).

Voraussetzungen für die Teilnahme / Prüfung

Wünschenswerte Voraussetzungen für die Teilnahme an den Lehrveranstaltungen:

Dieses Modul hat keine wünschenswerten Voraussetzungen für die Lehrveranstaltungen.

Verpflichtende Voraussetzungen für die Modulprüfungsanmeldung:

Dieses Modul hat keine Prüfungsvoraussetzungen.

Abschluss des Moduls

Benotung

Benotet

Prüfungsform

Portfolio examination

Art der Portfolioprüfung

Keine Angabe

Sprache(n)

English

Prüfungselemente

NamePunkte/GewichtKategorieDauer/Umfang
seminar presentation10Keine AngabeKeine Angabe
short oral exam (1)40Keine AngabeKeine Angabe
short oral exam (2)40Keine AngabeKeine Angabe
written seminar report30Keine AngabeKeine Angabe

Notenschlüssel

Keine Angabe

Prüfungsbeschreibung (Abschluss des Moduls)

This module will be tested as a portfolio exam, i.e. you accumulate points during the course of the module for the following partial performances: • (per lecture) short oral examination ("Rücksprache"): up to 40 points each • (seminar) written report: up to 30 points • (seminar) presentation: up to 10 points The total number of points (0-120) is then scaled linearly to the range (0-100) and converted into a final grade according to Conversion Table 1 of School IV.

Dauer des Moduls

Für Belegung und Abschluss des Moduls ist folgende Semesteranzahl veranschlagt:
2 Semester.

Dieses Modul kann in folgenden Semestern begonnen werden:
Winter- und Sommersemester.

Maximale teilnehmende Personen

Dieses Modul ist nicht auf eine Anzahl Studierender begrenzt.

Anmeldeformalitäten

Registration for the exam through the examination office. Registration for the course is necessary. Details will be published on time on our web page.

Literaturhinweise, Skripte

Skript in Papierform

Verfügbarkeit:  nicht verfügbar

 

Skript in elektronischer Form

Verfügbarkeit:  nicht verfügbar

 

Literatur

Empfohlene Literatur
Anderson, R.: Security Engineering, John Wiley, 2001
Bishop, M.: Computer Security: Art and Science, Addison Wesley, 2002
Buttyan, L. and Hubaux, J. - P.: Security and Cooperation in Wireless N etworks, Cambridge University Press, 2008
Defense Advanced Research Projects Agency ( DARPA ), HIGH PERFORMANCE MICROCHIP SUPPLY , www.cra.org/govaffairs/images/2005 - 02 - HPMS_Report_Final.pd
Denning, D.E.: Cryptography and Data Security, Addison Wesley, 1983
Eckert, C.: IT - Sicherheit, 3.Aufl., Oldenbourg - Verlag, 2004
Edward Amoroso. Fundamentals of Computer Security Technology. Prentice Hall PTR, 1994
Garfinkel, S.; Spafford, G.: Practical Unix and Internet Security, 3rd ed. O’Reilly, 2004
Garfinkel, S.; Spafford, G.: Practical Unix and Internet Security, 3rd ed. O’Reilly, 2004
Garvey P.R.: Analytical Methods for Risk Management: A Systems Engineering Perspective, ser. Statistics: a Series of Textbooks and Monographs. Boca Raton, FL, USA: Chapman and Hall/CRC, 2009
Gollmann, D.: Computer Security, John Wiley & Sons, 1999
Howard,M.; LeBlanc,D.: Writing Sec ure Code, Microsoft Press, 2001
Ken Dunham. Mobile Malware Attacks and Defense (Paperback). Syngress, November 2008
Marshall D. Abrams, Sushil Jajodia and Harold J. Podell. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos, California, USA, 1994
Morrie Gasser. Building a Secure Computer System. Van Nostrand Reinhold, 1988, http://www.cs.unomaha.edu/~stanw/gasserbook.pdf
Peter J. Denning. Computers Und er Attack: Intruders, Worms and Viruses. Addison - Wesley Professional, 1990
Pfleeger, C.P.: Security in Computing, 4th ed., Prentice Hall, 2007
Sean Smith und John Marchesini: The Craft of System Security , Addison - Wesley Longman, Amsterdam
Sean W. Smith Tru sted Computing Platforms: Design and Applications , Springer, Berlin
Stallings, W.: Cryptography and Network Security, 4th ed. Prentice Hall, 2006
Tansu Alpcan and Tamer Başar.: Network Security: A Decision and Game Theoretic Approach, Cambridge University Press, 2011
U.S. Department of Defense Computer Security Center, Rainbow Series, http://en.wikipedia.org/wiki/Rainbow_Series
William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin. Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition. Addison - We sley Professional, 2003.

Zugeordnete Studiengänge

Dieses Modul findet in keinem Studiengang Verwendung.

Studierende anderer Studiengänge können dieses Modul ohne Kapazitätsprüfung belegen.

Compulsory Module for Master degree Computer Engineering/Electrical Engineering (major field of study: Technical Applications).

Sonstiges

Keine Angabe