INFB Security of Mobile and Distributed Systems | Course | INF | |
---|---|---|---|
Lecturers : |
Prof. Dr. Claus Vielhauer
eMail
|
Term | 4 |
Course Classification : | Bachelor Informatik, Profil-Katalog B-INF-Profil | CH | 4 |
Language : | Deutsch | Type | VÜ |
Type of examination : | PL | Credits | 5 |
Method of evaluation : | written examination 120 min | ||
Requirements : | |||
Cross References : | |||
Previous knowledges : | Introduction to Security course | ||
Aids and special features : | Mode of assessment Pass at course examination Graded: yes Continuous Evaluation for assignments. Overall grade is the course examination grade. | ||
Teaching aims : | Students will know the most important protocols used in distributed systems. They will be aware of protocol weaknesses and resulting attacks. They will learn about firewalls, intrusion detection, intrusion response systems and honeynets. They will not only know protocols, such as IPSec, but also how to employ cryptographic methods to improve security. In addition, they will be knowledgeable about wireless network security. | ||
Contents : |
| ||
Literature : | Matt Bishop: Computer Security: Art and Science, Addison Wesley, ISBN-10: 9780201440997, 2002
Matt Bishop, Introduction to Computer Security, Addison Wesley, ISBN-10: 9780321247445, 2004
Charles P. Pfleger et al.: Security in Computing, Prentice Hall, 4th edition, ISBN-10: 9780132390774, 2006 Claudia Eckert: IT-Sicherheit. IT-Sicherheit: Konzepte - Verfahren - Protokolle, 9th Edition, Oldenbourgh Verlag, ISBN 978-3486778489, 2014 Raymond R. Panko: Corporate Computer and Network Security, Prentice Hall, ISBN-10: 9780130384713, March 2003 Murugiah Souppaya, Karen Scarfone: Guidelines for Managing the Security of Mobile Devices in the Enterprise, NIST Special Publication 800-124, Revision 1, http://nvlpubs.nist.gov/nistpubs/ SpecialPublications/NIST.SP.800-124r1.pdf, 2013 Himanshu Dwivedi, Chris Clark, David Thiel: Mobile Application Security 1st Edition,McGraw-Hill Education, 1st edition, ISBN-13: 978-0071633567, 2010 Vic (J.R.) Winkler: Securing the Cloud: Cloud Computer Security Techniques and Tactics 1st Edition, Syngress, ISBN-13: 978-1597495929, 2011 Michael Cross, Steven Palmer: Web application vulnerabilities: detect, exploit, prevent, ISBN-10: 9781597492096, 2007 Bruce Schneier: Angewandte Kryptographie, ISBN-10: 3893198547, 1996 Klaus Schmeh: Kryptografie: Verfahren - Protokolle – Infrastrukturen, 5th Edition, dpunkt.verlag, ISBN 978-3864900150, 2013 Dittmann: Digitale Wasserzeichen, ISBN-10: 3540666613, 2000 |