Page Content
Internet Security (Lecture, SoSe 2018)
As the common utilization of the Internet broadens, the threat from malicious programs and users increases. To counteract this development right from the design of new applications and technologies, we will discuss and try to identify the different attacks and threats (e.g., worms, viruses, denial of service). Based on this analysis, we will introduce countermeasures (e.g., firewalls, network intrusion detection/prevention systems, scanners) and explain challenges they frequently face. In addition, we will analyze active security tools, security protocols (e.g., SSL, Kerberos, TLS, VPN, IPsec, WLAN Security), key management approaches, and the security of different Internet services (e.g., E-Mail, SSH, VoIP, Network Storage).
Overview
Lecturers | Thomas Zinner [1],
Jean-Pierre Seifert [2] |
Additional
contact person: | Damien Foucard [3] |
Event type: | Lecture
(Vorlesung) |
Area: | Diplom
Informatik: Operating and Communication Systems / Betriebs-
und Kommunikationssysteme (BKS) Master of Computer Science: Communication-Based Systems (Master Informatik: Kommunikationsbasierte Systeme) Master of Computer Engineering: Technical Applications (Master Technische Informatik: Technische Anwendungen) Bachelor of Computer Science: Communication Technology (Bachelor Informatik: Kommunikationstechnik) Bachelor of Computer Engineering: Computer Engineering (Bachelor Technische Informatik: Technische Informatik) |
Modules: | Part of the modules
MINF-KT-NA/VTK.S12 [4], MINF-KT-NA/VTG.S12 [5]; MINF-KS-CS/VTS.S12 (FG
SECT) |
SWS: | 2 |
ECTS/LP: | 3 |
Time: | wednesdays,
12–14 p.m. weekly |
First
meeting: | 18 April
2018 |
Room: | EW 202 |
Course ID: | 0432 L
812 |
Audience: | bachelor students
after their basic studies (from the fifth semester on), master
students, and Diplom students |
Voraussetzungen: | basic
studies / basic modules as well as the lectures "Network Protocols and Architectures" (Prof. Feldmann), "TechGI 4" (Prof. Wolisz), or equivalent |
Exam: | tba |
further Information: | see ISIS
[6] |
Registration
If
you are interested in attending please make sure you are subscribed
to this course in ISIS to receive infomration and announcements.
A module registration is also required for Bachelor and
Master students. Further information will be given in the lecture and
via ISIS.
Exam
Exams will probably be oral. Further information, e.g., exam dates and how to register, will be given in the lecture or via ISIS.
Slides
- IS18 00 general PDF, 399 KB
- IS18 01 basic terms PDF, 320 KB
Further Literature on Selected Topics
- Botnets: The DoS Project's "trinoo" distributed denial of service attack tool [7]
General Literature
- Ken Dunham. Mobile Malware Attacks and Defense (Paperback). Syngress, November 2008. (english)
- Simson Garfinkel, Gene Spafford, and Alan Schwartz. Practical Unix & Internet Security, 3rd Edition (Paperback). O'Reilly Media, Inc., 2003. (english)
- Matt Bishop. Computer Security: Art and Science [8]. Addison-Wesley Professional, December 2002. (english)
- Joan Daemen and Vincent Rijment. The Design of Rijndael: AES – The Advanced Encryption Standard. Springer, 1st edition, March 2002. (english)
- Charles P. Pfleeger and Shari Lawrence Pfleeger. Security in Computing (4th Edition) . Prentice Hall PTR, Upper Saddle River, NJ, 2006. (english)
- Warwick Ford. Computer Communications Security: Principles, Standard Protocols and Techniques. Prentice Hall PTR, 2006. (english)
- William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin. Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition. Addison-Wesley Professional, 2003. (english)
- William Stallings. Cryptography and Network Security (4th Edition). Prentice Hall, 2005. (english)
- Charlie Kaufman, Radia Perlman and Mike Speciner. Network Security: Private Communication in a Public World, Second Edition. Prentice Hall PTR, 2005. (english)
- Marshall D. Abrams, Sushil Jajodia and Harold J. Podell. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos, California, USA, 1994. (english)
- Edward Amoroso. Fundamentals of Computer Security Technology. Prentice Hall PTR, 1994. (english)
- Dorothy Elizabeth Robling Denning. Cryptography and Data Security. Addison-Wesley Pub, 1982. (english)
- Peter J. Denning. Computers Under Attack: Intruders, Worms and Viruses. Addison-Wesley Professional, 1990. (english)
- Douglas R. Stinson. Cryptography: Theory and Practice, Second Edition. Chapman & Hall/CRC, 2002. (english)
- Morrie Gasser. Building a Secure Computer System. Van Nostrand Reinhold, 1988. (english)
- Elizabeth D. Zwicky (Author), Simon Cooper (Author), D. Brent Chapman. Building Internet Firewalls (2nd Edition). O'Reilly Media, Inc., 2000. (english)
Lehre / Teaching, SoSe 18
- Internet Control Plane (VL) [9]
- Routerlab (PR) [10]
- Internet Security (VL) [11]
- Internet Measurement (VL) [12]
- NA: Internet Measurement (SE) [13]
Lecturer: Anja Feldmann, Jean-Pierre Seifert
Period:
18.04.2018 to 18.07.2018
We 12:00 - 14:00 o'clock
Location: EW 202
ISIS [14]
_assistants/dfoucard/parameter/en/font3/minhilfe/
es/vtk_module/parameter/en/font3/minhilfe/
es/vtg_module/parameter/en/font3/minhilfe/
alysis
t-Bishop/dp/0201440997
8/icp18/parameter/en/font3/minhilfe/
18/rl18/parameter/en/font3/minhilfe/
18/is18/parameter/en/font3/minhilfe/
18/im18/parameter/en/font3/minhilfe/
18/se18/parameter/en/font3/minhilfe/