Main content

CS 515 — IT-Security
(dt. IT-Sicherheit)

Level, degree of commitment Advanced module, compulsory elective module
Forms of teaching and learning,
workload
Lecture (4 SWS), recitation class (2 SWS),
270 hours (90 h attendance, 180 h private study)
Credit points,
formal requirements
9 CP
Course requirement(s): Successful completion of at least 50 percent of the points from the weekly exercises as well as at least 2 presentations of the tasks.
Examination type: Oral examination (individual examination) or written examination
Language,
Grading
German,
The grading is done with 0 to 15 points according to the examination regulations for the degree program B.Sc. Computer Science.
Duration,
frequency
One semester,
each summer semester
Person in charge of the module's outline Prof. Dr. Elmar Tischhauser, Prof. Dr. Bernd Freisleben

Contents

The lecture deals with methods, tools and processes for developing systems that should be secure and reliable against malicious attacks and incorrect input. In particular, the following topics will be addressed:

  • Cryptography basics
  • Authentication & Access Control
  • Vulnerability Classes
  • OS Security
  • Mobile Device and IoT Security
  • Network Security
  • Network Attacks
  • Malicious Software
  • Reverse Engineering
  • Web Security
  • Privacy Security
  • Cloud Security

Understanding and application of the concepts presented in the lecture will be practiced in the exercise, especially the security evaluation of software and systems as well as best practices for the use of security procedures in different application scenarios.


Qualification Goals

Students will be able to,

  • understand malicious attacks on software systems,
  • design and implement secure software systems
  • Are able to apply scientific work methods in independently identifying, formulating and solving problems,
  • are able to speak freely about scientific content, both in front of an audience and in a discussion.

Prerequisites

None. The competences taught in the following modules are recommended: Object-oriented Programming, either Algorithms and Data Structures or Practical Informatics II: Data Structures and Algorithms for Pre-Service-Teachers, System Software and Computer Communication.


Applicability

The module can be attended at FB12 in study program(s)

  • B.Sc. Data Science
  • B.Sc. Computer Science
  • M.Sc. Data Science
  • M.Sc. Computer Science
  • M.Sc. Mathematics
  • M.Sc. Business Informatics
  • M.Sc. Business Mathematics
  • LAaG Computer Science

When studying B.Sc. Computer Science, this module can be attended in the study area Compulsory Elective Modules in Computer Science.

The module can also be used in other study programs (export module).


Recommended Reading

  • Ross Anderson: “Security Engineering”, Wiley-Verlag, 2008
  • Claudia Eckert: “IT-Sicherheit”, de Gruyter, 2018
  • Doug Stinson: Cryptography: Theory and Practice, Taylor&Francis, 2019



Please note:

This page describes a module according to the latest valid module guide in Winter semester 2023/24. Most rules valid for a module are not covered by the examination regulations and can therefore be updated on a semesterly basis. The following versions are available in the online module guide:

The module guide contains all modules, independent of the current event offer. Please compare the current course catalogue in Marvin.

The information in this online module guide was created automatically. Legally binding is only the information in the examination regulations (Prüfungsordnung). If you notice any discrepancies or errors, we would be grateful for any advice.