Zur Modulseite PDF generieren

#40390 / #1

SS 2014 - SS 2014

English

Computer Security - Vertiefung klein

6

Seifert, Jean-Pierre

Benotet

Portfolioprüfung

English

Zugehörigkeit


Fakultät IV

Institut für Softwaretechnik und Theoretische Informatik

34355100 FG S-Professur Security in Telecommunications (SecT)

Keine Angabe

Kontakt


Keine Angabe

Bauroth, Stephan

lehre@sect.tu-berlin.de

Keine Angabe

Lernergebnisse

The module’s qualification aims are to get to know certain basics and technical details of each lecture’s subject (Internet Security, Software Security and Telecommunication Security). Those lectures are the foundation upon which project papers and theses can be based. Having completed this course all students will have solid knowledge of each small and clearly defined subject. This course provides: Technical skills: 40% Method skills: 30% System skills: 15% Soft skills: 15%

Lehrinhalte

a) Internet Security As the common utilization of the Internet broadens, the threat from malicious programs and users increases. To counteract this development during the design of new applications and technologies, we will try to identify and discuss the different attacks and threats (e.g., worms, viruses, denial of service). Based on that countermeasures (e.g., firewalls, network intrusion detection/prevention systems, scanners) are introduced and the challenges those are facing are explained. In addition to these active security tools, secure protocols (e.g., SSL, Kerberos, TLS, VPN, IPsec, WLAN Security), key management approaches, and the security of different Internet services (e.g., E-Mail, SSH, VoIP, Network Storage) will be analysed. b) Telecommunication Security Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems as their primary means of connecting to the world around them. Given the significant focus on securing this critical infrastructure in recent years, this course creates a starting place for students and young researchers into the field of secure telecommunications networks. This course not only discusses emerging threats, along with system vulnerabilities, but also presents the open questions raised by network evolution and defence mechanisms. The course will also discuss securing current and next generation telecommunications networks. c) Software Security: Broadly speaking, this course tries to address two questions: What are common software security problems and what are their underlying causes? What are techniques, guidelines, principles, and tools to prevent or detect them? Common security problems include buffer overflows, integer overflows, SQL injection, XSS, and race conditions. Techniques to prevent or detect problems include threat modelling, check lists and coding standards, static analysis tools, code reviews, typing, static analysis, language-based security (or platform-based security), security middleware, runtime monitoring, information flow analysis, program verification, and proof-carrying code. Both, problems and solutions can be specific to the operating system, the programming language, middleware, type of application, or just down to the individual application. In order not to get lost in the forest of possibilities, we will try to understand the common themes: the root causes that lie at the heart of many problems and the fundamental good principles embodied by some of the solutions.

Modulbestandteile

Compulsory area

Die folgenden Veranstaltungen sind für das Modul obligatorisch:

LehrveranstaltungenArtNummerTurnusSpracheSWS ISIS VVZ
Internet SecurityVL0434 L 962SoSeKeine Angabe2

Compulsory elective area

Aus den folgenden Veranstaltungen muss eine Veranstaltung abgeschlossen werden.

LehrveranstaltungenArtNummerTurnusSpracheSWS ISIS VVZ
Software SecurityVL0434 L 982WiSe/SoSeKeine Angabe2
Telecommunication SecurityVL0434 L 981WiSe/SoSeKeine Angabe2

Arbeitsaufwand und Leistungspunkte

Internet Security (VL):

AufwandbeschreibungMultiplikatorStundenGesamt
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)

Software Security (VL):

AufwandbeschreibungMultiplikatorStundenGesamt
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)

Telecommunication Security (VL):

AufwandbeschreibungMultiplikatorStundenGesamt
Präsenzzeit15.02.0h30.0h
Vor-/Nachbearbeitung15.04.0h60.0h
90.0h(~3 LP)
Der Aufwand des Moduls summiert sich zu 180.0 Stunden. Damit umfasst das Modul 6 Leistungspunkte.

Beschreibung der Lehr- und Lernformen

This module features classical lectures only.

Voraussetzungen für die Teilnahme / Prüfung

Wünschenswerte Voraussetzungen für die Teilnahme an den Lehrveranstaltungen:

Dieses Modul hat keine wünschenswerten Voraussetzungen für die Lehrveranstaltungen.

Verpflichtende Voraussetzungen für die Modulprüfungsanmeldung:

Dieses Modul hat keine Prüfungsvoraussetzungen.

Abschluss des Moduls

Benotung

Benotet

Prüfungsform

Portfolio examination

Art der Portfolioprüfung

Keine Angabe

Sprache(n)

English

Prüfungselemente

NamePunkte/GewichtKategorieDauer/Umfang
Short oral exam (1)50Keine AngabeKeine Angabe
Short oral exam (2)50Keine AngabeKeine Angabe

Notenschlüssel

Keine Angabe

Prüfungsbeschreibung (Abschluss des Moduls)

The total number of points (0-100) is converted into a final grade according to Conversion Table 1 of School IV.

Dauer des Moduls

Für Belegung und Abschluss des Moduls ist folgende Semesteranzahl veranschlagt:
1 Semester.

Dieses Modul kann in folgenden Semestern begonnen werden:
Winter- und Sommersemester.

Maximale teilnehmende Personen

Dieses Modul ist nicht auf eine Anzahl Studierender begrenzt.

Anmeldeformalitäten

Registration for the exam through the examination office. Registration for the course is necessary. Details will be published on time on our web page.

Literaturhinweise, Skripte

Skript in Papierform

Verfügbarkeit:  nicht verfügbar

 

Skript in elektronischer Form

Verfügbarkeit:  nicht verfügbar

 

Literatur

Empfohlene Literatur
Anderson, R.: Security Engineering, John Wiley, 2001
Bishop, M.: Computer Security: Art and Science, Addison Wesley, 2002
Defense Advanced Research Projects Agency (DARPA), HIGH PERFORMANCE MICROCHIP SUPPLY, www.cra.org/govaffairs/images/2005-02-HPMS_Report_Final.pdf
Denning, D.E.: Cryptography and Data Security, Addison Wesley, 1983
Eckert, C.: IT-Sicherheit, 3.Aufl., Oldenbourg-Verlag, 2004
Edward Amoroso. Fundamentals of Computer Security Technology. Prentice Hall PTR, 1994.
Garfinkel, S.; Spafford, G.: Practical Unix and Internet Security, 3rd ed. O'Reilly, 2004
Gollmann, D.: Computer Security, John Wiley & Sons, 1999
Howard,M.; LeBlanc,D.: Writing Secure Code, Microsoft Press, 2001
Ken Dunham. Mobile Malware Attacks and Defense (Paperback). Syngress, November 2008.
Marshall D. Abrams, Sushil Jajodia and Harold J. Podell. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos, California, USA, 1994.
Morrie Gasser. Building a Secure Computer System. Van Nostrand Reinhold, 1988, http://www.cs.unomaha.edu/~stanw/gasserbook.pdf
Peter J. Denning. Computers Under Attack: Intruders, Worms and Viruses. Addison-Wesley Professional, 1990.
Pfleeger, C.P.: Security in Computing, 4th ed., Prentice Hall, 2007
Sean Smith und John Marchesini: The Craft of System Security, Addison-Wesley Longman, Amsterdam
Sean W. Smith Trusted Computing Platforms: Design and Applications, Springer, Berlin
Stallings, W.: Cryptography and Network Security, 4th ed. Prentice Hall, 2006
U.S. Department of Defense Computer Security Center, Rainbow Series, http://en.wikipedia.org/wiki/Rainbow_Series
William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin. Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition. Addison-Wesley Professional, 2003.

Zugeordnete Studiengänge

Dieses Modul findet in keinem Studiengang Verwendung.

Studierende anderer Studiengänge können dieses Modul ohne Kapazitätsprüfung belegen.

Compulsory Module for Master degree Computer Engineering/Electrical Engineering (major field of study: Technical Applications).

Sonstiges

Keine Angabe