Anzeigesprache
Zur Modulseite PDF generieren

#40389 / #2

WS 2014/15 - WS 2014/15

Deutsch/Englisch

Computer Security - Vertiefung groß

9

Seifert, Jean-Pierre

benotet

Portfolioprüfung

Zugehörigkeit


Fakultät IV

Institut für Softwaretechnik und Theoretische Informatik

34355100 FG S-Professur Security in Telecommunications

Keine Angabe

Kontakt


TEL 16

Bauroth, Stephan

lehre@sect.tu-berlin.de

Lernergebnisse

The module’s qualification aims are to get to know theoretical basics and technical details of each lecture’s subject (Hardware Security, Foundations of Computer Security I & II or Cryptography for Security). Furthermore, showing examples matching the themes will motivate students to make practice use of what they just have learned. Those lectures are the foundation upon which project papers and theses can be based on. This course provides: Technical skills: 40% Method skills: 30% System skills: 15% Soft skills: 15%

Lehrinhalte

a) Hardware Security More and more powerful electronical devices and their applications, from mobiles, car infotainment, e-banking, electronic cash, internet via PC, mobile, gaming consoles or televisions to machine to machine communication are pervading our lives. In that context the requirements to these systems to ensure a secure and reliable program execution even in malicious environments are constantly increasing. These requirements can often be fulfilled with special hardware only. Modern CPUs and platforms provide with e.g. La Grande (Intel) and Trustzone (ARM) hardware extensions which make construction of such systems feasible. This lecture deals with existing modern security hardware and discusses their functions and principles. b) Foundations of Security The Foundations of Computer Security lecture aims to give a thorough introduction into the very diverse field of computer security from a theoretical point of view. The focus here is on such computer security aspects which can be precisely captured in a formal, logical, and mathematical way, and which allow moreover proofs of meaningful theorems in that field. Students of this course will learn how to think precisely about computer security against arbitrary attacks, a skill that will remain relevant and useful regardless of how technology and standards change. With just enough formalism to maintain precision and rigor without obscuring the development of ideas. We convey both the theories’ conceptual beauty and its relevance to practice. c) Cryptography for Security Over the past 30 years cryptography has been transformed from a mysterious art into a mathematically rigorous science. Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. This course provides a rigorous yet accessible treatment of modern cryptography, with a focus on definitions, precise assumptions, and rigorous proofs. We introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private key encryption and message authentication follows. We illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half focuses on public key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public key encryption and digital signatures, this lecture concludes with a discussion of the random oracle model and its applications. This course presents the necessary tools to fully understand this fascinating subject. d) Computer Security Seminar The Computer Security Seminar offered each semester deals with most recent subjects in respect of the latest state of research regarding Computer Security focusing Internet Security, Cryptography, Foundations of Security I & II, Hardware Security, Software Security, and Telecommunication Security.

Modulbestandteile

Pflichtteil:

Die folgenden Veranstaltungen sind für das Modul obligatorisch:

LehrveranstaltungenArtNummerTurnusSpracheSWSVZ
Computer Security SeminarSEM0434 L 956WiSe/SoSeKeine Angabe2

Wahlpflicht:

Aus den folgenden Veranstaltungen muss/müssen 2 Veranstaltung(en) abgeschlossen werden.

LehrveranstaltungenArtNummerTurnusSpracheSWSVZ
Cryptography for SecurityVL0434 L 964WiSe/SoSeKeine Angabe2
Foundations of Computer Security IVL0434 L 963WiSe/SoSeKeine Angabe2
Foundations of Computer Security IIVLWiSe/SoSeKeine Angabe2
HardwareSecurityVL0434 L 983WiSe/SoSeKeine Angabe2

Arbeitsaufwand und Leistungspunkte

Computer Security Seminar (SEM):

AufwandbeschreibungMultiplikatorStundenGesamt
1. Background Research1.020.0h20.0h
2. Written Report1.025.0h25.0h
3. Talk Preparation, Slides1.015.0h15.0h
4. Presence Hours15.02.0h30.0h
90.0h(~3 LP)

Cryptography for Security (VL):

AufwandbeschreibungMultiplikatorStundenGesamt
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)

Foundations of Computer Security I (VL):

AufwandbeschreibungMultiplikatorStundenGesamt
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)

Foundations of Computer Security II (VL):

AufwandbeschreibungMultiplikatorStundenGesamt
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)

HardwareSecurity (VL):

AufwandbeschreibungMultiplikatorStundenGesamt
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)
Der Aufwand des Moduls summiert sich zu 270.0 Stunden. Damit umfasst das Modul 9 Leistungspunkte.

Beschreibung der Lehr- und Lernformen

Keine Angabe

Voraussetzungen für die Teilnahme / Prüfung

Wünschenswerte Voraussetzungen für die Teilnahme an den Lehrveranstaltungen:

Keine Angabe

Verpflichtende Voraussetzungen für die Modulprüfungsanmeldung:

Dieses Modul hat keine Prüfungsvoraussetzungen.

Abschluss des Moduls

Benotung

benotet

Prüfungsform

Art der Portfolioprüfung

Keine Angabe

Sprache

Deutsch/Englisch

Prüfungselemente

NamePunkte/GewichtKategorieDauer/Umfang
lecture oral exam 140Keine AngabeKeine Angabe
lecture oral exam 240Keine AngabeKeine Angabe
seminar presentation10Keine AngabeKeine Angabe
seminar written report30Keine AngabeKeine Angabe

Notenschlüssel

Keine Angabe

Prüfungsbeschreibung (Abschluss des Moduls)

This module will be tested as a portfolio exam, i.e. you accumulate points during the course of the module for the following partial performances: • (per lecture) short oral examination ("Rücksprache"): up to 40 points each • (seminar) written report: up to 30 points • (seminar) presentation: up to 10 points The total number of points (0-120) is then scaled linearly to the range (0-100) and converted into a final grade according to Conversion Table 1 of School IV.

Dauer des Moduls

Für Belegung und Abschluss des Moduls ist folgende Semesteranzahl veranschlagt:
2 Semester.

Dieses Modul kann in folgenden Semestern begonnen werden:
Winter- und Sommersemester.

Maximale teilnehmende Personen

Dieses Modul ist nicht auf eine Anzahl Studierender begrenzt.

Anmeldeformalitäten

Keine Angabe

Literaturhinweise, Skripte

Skript in Papierform

Verfügbarkeit:  nicht verfügbar

 

Skript in elektronischer Form

Verfügbarkeit:  nicht verfügbar

 

Literatur

Empfohlene Literatur
Anderson, R.: Security Engineering, John Wiley, 2001
Bishop, M.: Computer Security: Art and Science, Addison Wesley, 2002
Buttyan, L. and Hubaux, J. - P.: Security and Cooperation in Wireless N etworks, Cambridge University Press, 2008
Defense Advanced Research Projects Agency ( DARPA ), HIGH PERFORMANCE MICROCHIP SUPPLY , www.cra.org/govaffairs/images/2005 - 02 - HPMS_Report_Final.pd
Denning, D.E.: Cryptography and Data Security, Addison Wesley, 1983
Eckert, C.: IT - Sicherheit, 3.Aufl., Oldenbourg - Verlag, 2004
Edward Amoroso. Fundamentals of Computer Security Technology. Prentice Hall PTR, 1994
Garfinkel, S.; Spafford, G.: Practical Unix and Internet Security, 3rd ed. O’Reilly, 2004
Garfinkel, S.; Spafford, G.: Practical Unix and Internet Security, 3rd ed. O’Reilly, 2004
Garvey P.R.: Analytical Methods for Risk Management: A Systems Engineering Perspective, ser. Statistics: a Series of Textbooks and Monographs. Boca Raton, FL, USA: Chapman and Hall/CRC, 2009
Gollmann, D.: Computer Security, John Wiley & Sons, 1999
Howard,M.; LeBlanc,D.: Writing Sec ure Code, Microsoft Press, 2001
Ken Dunham. Mobile Malware Attacks and Defense (Paperback). Syngress, November 2008
Marshall D. Abrams, Sushil Jajodia and Harold J. Podell. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos, California, USA, 1994
Morrie Gasser. Building a Secure Computer System. Van Nostrand Reinhold, 1988, http://www.cs.unomaha.edu/~stanw/gasserbook.pdf
Peter J. Denning. Computers Und er Attack: Intruders, Worms and Viruses. Addison - Wesley Professional, 1990
Pfleeger, C.P.: Security in Computing, 4th ed., Prentice Hall, 2007
Sean Smith und John Marchesini: The Craft of System Security , Addison - Wesley Longman, Amsterdam
Sean W. Smith Tru sted Computing Platforms: Design and Applications , Springer, Berlin
Stallings, W.: Cryptography and Network Security, 4th ed. Prentice Hall, 2006
Tansu Alpcan and Tamer Başar.: Network Security: A Decision and Game Theoretic Approach, Cambridge University Press, 2011
U.S. Department of Defense Computer Security Center, Rainbow Series, http://en.wikipedia.org/wiki/Rainbow_Series
William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin. Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition. Addison - We sley Professional, 2003.

Zugeordnete Studiengänge


Diese Modulversion wird in folgenden Studiengängen verwendet:

Studiengang / StuPOStuPOsVerwendungenErste VerwendungLetzte Verwendung
Dieses Modul findet in keinem Studiengang Verwendung.

Studierende anderer Studiengänge können dieses Modul ohne Kapazitätsprüfung belegen.

Keine Angabe

Sonstiges

Keine Angabe