Main content
This entry is from Winter semester 2018/19 and might be obsolete. No current equivalent could be found.
CS 515 — IT-Security
(dt. IT-Sicherheit)
Level, degree of commitment | Advanced module, compulsory elective module |
Forms of teaching and learning, workload |
Lecture (4 SWS), recitation class (2 SWS), 270 hours (90 h attendance, 180 h private study) |
Credit points, formal requirements |
9 CP Course requirement(s): Oral or written examination Examination type: Successful completion of at least 50 percent of the points from the weekly exercises as well as at least 2 presentations of the tasks. |
Language, Grading |
German,The grading is done with 0 to 15 points according to the examination regulations for the degree program B.Sc. Computer Science. |
Duration, frequency |
One semester, In der Regel jedes zweite Wintersemester |
Person in charge of the module's outline | Prof. Dr. Bernd Freisleben |
Contents
The lecture deals with methods, tools and processes for the development of software systems that should be secure and reliable against malicious attacks and wrong inputs. The following topics will be covered:
1. cryptography
2. authentication & access control
3. vulnerability classes
4. OS security
5. mobile device security
6. network security
7. network attacks
8. malicious software
9. reverse engineering
10. web security
11. privacy
Qualification Goals
The aim of the module is to enable listeners to understand malicious attacks on software systems. After visiting the module, listeners should be able to design and implement secure software systems. The students practice scientific working methods (recognizing, formulating, solving problems, training abstract ability) and train oral communication skills in the exercises by practicing free speech in front of an audience and during discussion.
Prerequisites
Translation is missing. Here is the German original:
Keine. Empfohlen werden die Kompetenzen, die in den Modulen Objektorientierte Programmierung, Algorithmen und Datenstrukturen, sowie Systemsoftware und Rechnerkommunikation vermittelt werden.
Applicability
Module imported from B.Sc. Computer Science.
It can be attended at FB12 in study program(s)
- B.Sc. Data Science
- B.Sc. Computer Science
- B.Sc. Business Informatics
- M.Sc. Data Science
- M.Sc. Computer Science
- M.Sc. Mathematics
- M.Sc. Business Informatics
- M.Sc. Business Mathematics
- LAaG Computer Science
When studying B.Sc. Business Informatics, this module can be attended in the study area Compulsory Elective Modules in Computer Science.
Die Wahlmöglichkeit des Moduls ist dadurch beschränkt, dass es der Praktischen Computer Science zugeordnet ist.
Recommended Reading
- Clauda Eckert: IT-Sicherheit: Konzepte, Verfahren, Protokolle, Oldenbourg, 2009. Ross Anderson: Security Engineering, Wiley, 2008. William Stallings: Network Security Essentials, Pearson, 2011.
Please note:
This page describes a module according to the latest valid module guide in Winter semester 2018/19. Most rules valid for a module are not covered by the examination regulations and can therefore be updated on a semesterly basis. The following versions are available in the online module guide:
- Winter 2016/17
- Summer 2018
- Winter 2018/19
- Winter 2019/20
- Winter 2020/21
- Summer 2021
- Winter 2021/22
- Winter 2022/23
- Winter 2023/24 (no corresponding element)
The module guide contains all modules, independent of the current event offer. Please compare the current course catalogue in Marvin.
The information in this online module guide was created automatically. Legally binding is only the information in the examination regulations (Prüfungsordnung). If you notice any discrepancies or errors, we would be grateful for any advice.