Page Content
Internet Security (Lecture, SoSe 2011)
As the common utilization of the Internet broadens, the threat from malicious programs and users increases. To counteract this development during the design of new applications and technologies, we will try to identify and discuss the different attacks and threats (e.g., worms, viruses, denial of service). Based on that countermeasures (e.g., firewalls, network intrusion detection/prevention systems, scanners) are introduced and the challenges those are facing are explained. In addition to these active security tools, secure protocols (e.g., SSL, Kerberos, TLS, VPN, IPsec, WLAN Security), key management approaches, and the security of different Internet services (e.g., E-Mail, SSH, VoIP, Network Storage) will be analysed.
News
- The lecture is over.
- The lecture evaluation has been done.
Overview
Lecturers | Anja Feldmann, Jean-Pierre Seifert (FG SecT) |
Additional contact person: | Jan Böttger |
Event type: | Lecture (Vorlesung) |
Area: | Diplom Informatik: Operating and Communication Systems / Betriebs- und Kommunikationssysteme (BKS) Master of Computer Science: Communication-Based Systems (Master Informatik: Kommunikationsbasierte Systeme) Master of Computer Engineering: Technical Applications (Master Technische Informatik: Technische Anwendungen) Bachelor of Computer Science: Communication Technology (Bachelor Informatik: Kommunikationstechnik) Bachelor of Computer Engineering: Computer Engineering (Bachelor Technische Informatik: Technische Informatik) |
Modules: | Part of the modules MINF-KT-NA/VTK.S11, MINF-KT-NA/VTG.S11 |
SWS: | 2 |
ECTS/LP: | 3 |
Time: | wednesdays, 10–12 a.m. weekly |
First meeting: | 13 April 2011 |
Room: | MA 043 |
Course ID: | 0432 L 812 |
Audience: | bachelor students after their basic studies (from the fifth semester on), master students, and Diplom students |
Voraussetzungen: | basic studies / basic modules as well as the lectures "Network Protocols and Architectures" (Prof. Feldmann), "TechGI 4" (Prof. Wolisz), or equivalent |
Exam: | tba |
further Information: | see ISIS |
Registration
If you are interested in attending please make sure you are subscribed to this course in ISIS to receive infomration and announcements.
A module registration is also required for Bachelor and Master students. Further information will be given in the lecture and via ISIS.
Exam
The rooms and dates for the exams wil be as follows:
- July 21st, 2011, TEL 17, room Madeira
- July 22nd, 2011, TEL 16, room Mistral
- July 25th, 2011, TEL 17, room Madeira
- August 28th, 2011, TEL 16, room Mistral
- October 4th, 2011, TEL 17, room Madeira
- October 6th, 2011, TEL 17, room Madeira
- October 14th, 2011, TEL 16, room Mistral
Slides
- 00. General Information and Overview PDF, 1,006 KB
- 01. Basic Terms PDF, 1 MB
- 02. Crypto Basic (1): Overview, Public vs. private key, history, modern ciphers, ... PDF, 2 MB
- 03. Crypto Basics (2): Public Key Crypto, public key exchange PDF, 298 KB
- 04. The Threads of Internet Worms PDF, 2 MB
- 05. Botnets PDF, 2 MB
- 06. Crypto Basics (3): Attacks agains AES; RSA; Message digestion/Hashing/MAC; Digital signatures PDF, 563 KB
- 07. Network Security Standards: Key distr.; Kerberos, SSL/TLS PDF, 729 KB
- 08. Web (in)security PDF, 5 MB
- 09. Firewalls and NAT PDF, 401 KB
- 10. Browser Security: Intro, Basics, Security Problems PDF, 2 MB
- 11. Data Center Security and Network Architecture PDF, 5 MB
- 12. Intrusion Detection Systems PDF, 580 KB
- 13: RSA Signatures PDF, 92 KB
- 14: SIP and VoIP PDF, 4 MB
- 15: Phishing PDF, 3 MB
- 16: An Assessment of Overt Malicious Activity Manifest in Residential Networks PDF, 1 MB
Literature
- Ken Dunham. Mobile Malware Attacks and Defense (Paperback). Syngress, November 2008. (english)
- Simson Garfinkel, Gene Spafford, and Alan Schwartz. Practical Unix & Internet Security, 3rd Edition (Paperback). O'Reilly Media, Inc., 2003. (english)
- Matt Bishop. Computer Security: Art and Science. Addison-Wesley Professional, December 2002. (english)
- Joan Daemen and Vincent Rijment. The Design of Rijndael: AES – The Advanced Encryption Standard. Springer, 1st edition, March 2002. (english)
- Charles P. Pfleeger and Shari Lawrence Pfleeger. Security in Computing (4th Edition) . Prentice Hall PTR, Upper Saddle River, NJ, 2006. (english)
- Warwick Ford. Computer Communications Security: Principles, Standard Protocols and Techniques. Prentice Hall PTR, 2006. (english)
- William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin. Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition. Addison-Wesley Professional, 2003. (english)
- William Stallings. Cryptography and Network Security (4th Edition). Prentice Hall, 2005. (english)
- Charlie Kaufman, Radia Perlman and Mike Speciner. Network Security: Private Communication in a Public World, Second Edition. Prentice Hall PTR, 2005. (english)
- Marshall D. Abrams, Sushil Jajodia and Harold J. Podell. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos, California, USA, 1994. (english)
- Edward Amoroso. Fundamentals of Computer Security Technology. Prentice Hall PTR, 1994. (english)
- Dorothy Elizabeth Robling Denning. Cryptography and Data Security. Addison-Wesley Pub, 1982. (english)
- Peter J. Denning. Computers Under Attack: Intruders, Worms and Viruses. Addison-Wesley Professional, 1990. (english)
- Douglas R. Stinson. Cryptography: Theory and Practice, Second Edition. Chapman & Hall/CRC, 2002. (english)
- Morrie Gasser. Building a Secure Computer System. Van Nostrand Reinhold, 1988. (english)
- Elizabeth D. Zwicky (Author), Simon Cooper (Author), D. Brent Chapman. Building Internet Firewalls (2nd Edition). O'Reilly Media, Inc., 2000. (english)
Zusatzinformationen / Extras
Quick Access:
Auxiliary Functions
Registration at Prüfungsamt
Exam and moduleregistration at INET
take place via the
Prüfungsamt (exam
office).
0432 L 812
: Anja Feldmann, Jean-Pierre Seifert
:
13.04.2011 13.07.2011
10:00 - 12:00
: MA 043
Internet Security (VL)
ISIS