back to table of content


INFB  Security of Mobile and Distributed Systems Course INF
Lecturers : Prof. Dr. Claus Vielhauer    eMail
Term 4
Course Classification : Bachelor Informatik, Profil-Katalog B-INF-Profil CH 4
Language : Deutsch Type VÜ 
Type of examination : PL  Credits
Method of evaluation : written examination 120 min 
Requirements :
Cross References :  
Previous knowledges : Introduction to Security course 
Aids and special features : Mode of assessment
Pass at course examination
Graded: yes
Continuous Evaluation for assignments.
Overall grade is the course examination grade. 
Teaching aims : Students will know the most important protocols used in distributed systems. They will be aware of protocol weaknesses and resulting attacks. They will learn about firewalls, intrusion detection, intrusion response systems and honeynets. They will not only know protocols, such as IPSec, but also how to employ cryptographic methods to improve security. In addition, they will be knowledgeable about wireless network security. 
Contents :

 

Literature : Matt Bishop: Computer Security: Art and Science, Addison Wesley, ISBN-10: 9780201440997, 2002 Matt Bishop, Introduction to Computer Security, Addison Wesley, ISBN-10: 9780321247445, 2004 Charles P. Pfleger et al.: Security in Computing, Prentice Hall, 4th edition, ISBN-10: 9780132390774, 2006
Claudia Eckert: IT-Sicherheit. IT-Sicherheit: Konzepte - Verfahren - Protokolle, 9th Edition, Oldenbourgh Verlag, ISBN 978-3486778489, 2014
Raymond R. Panko: Corporate Computer and Network Security, Prentice Hall, ISBN-10: 9780130384713, March 2003
Murugiah Souppaya, Karen Scarfone: Guidelines for Managing the Security of Mobile Devices in the Enterprise, NIST Special Publication 800-124, Revision 1, http://nvlpubs.nist.gov/nistpubs/ SpecialPublications/NIST.SP.800-124r1.pdf, 2013
Himanshu Dwivedi, Chris Clark, David Thiel: Mobile Application Security 1st Edition,McGraw-Hill Education, 1st edition, ISBN-13: 978-0071633567, 2010
Vic (J.R.) Winkler: Securing the Cloud: Cloud Computer Security Techniques and Tactics 1st Edition, Syngress, ISBN-13: 978-1597495929, 2011
Michael Cross, Steven Palmer: Web application vulnerabilities: detect, exploit, prevent, ISBN-10: 9781597492096, 2007
Bruce Schneier: Angewandte Kryptographie, ISBN-10: 3893198547, 1996
Klaus Schmeh: Kryptografie: Verfahren - Protokolle – Infrastrukturen, 5th Edition, dpunkt.verlag, ISBN 978-3864900150, 2013
Dittmann: Digitale Wasserzeichen, ISBN-10: 3540666613, 2000  


back to table of content