Main content

This entry is from Winter semester 2018/19 and might be obsolete. You can find a current equivalent here.

CS 515 — IT-Security
(dt. IT-Sicherheit)

Level, degree of commitment Advanced module, depends on importing study program
Forms of teaching and learning,
workload
Lecture (4 SWS), recitation class (2 SWS),
270 hours (90 h attendance, 180 h private study)
Credit points,
formal requirements
9 CP
Course requirement(s): Oral or written examination
Examination type: Successful completion of at least 50 percent of the points from the weekly exercises as well as at least 2 presentations of the tasks.
Language,
Grading
German,
The grading is done with 0 to 15 points according to the examination regulations for the degree program B.Sc. Computer Science.
Origin B.Sc. Computer Science
Duration,
frequency
One semester,
In der Regel jedes zweite Wintersemester
Person in charge of the module's outline Prof. Dr. Bernd Freisleben

Contents

The lecture deals with methods, tools and processes for the development of software systems that should be secure and reliable against malicious attacks and wrong inputs. The following topics will be covered:

1. cryptography

2. authentication & access control

3. vulnerability classes

4. OS security

5. mobile device security

6. network security

7. network attacks

8. malicious software

9. reverse engineering

10. web security

11. privacy


Qualification Goals

The aim of the module is to enable listeners to understand malicious attacks on software systems. After visiting the module, listeners should be able to design and implement secure software systems. The students practice scientific working methods (recognizing, formulating, solving problems, training abstract ability) and train oral communication skills in the exercises by practicing free speech in front of an audience and during discussion.


Prerequisites

Translation is missing. Here is the German original:

Keine. Empfohlen werden die Kompetenzen, die in den Modulen Objektorientierte Programmierung, Algorithmen und Datenstrukturen, sowie Systemsoftware und Rechnerkommunikation vermittelt werden.


Applicability

The module can be attended at FB12 in study program(s)

  • B.Sc. Data Science
  • B.Sc. Computer Science
  • B.Sc. Business Informatics
  • M.Sc. Data Science
  • M.Sc. Computer Science
  • M.Sc. Mathematics
  • M.Sc. Business Informatics
  • M.Sc. Business Mathematics
  • LAaG Computer Science

When studying B.Sc. Computer Science, this module can be attended in the study area Compulsory Elective Modules in Computer Science.

The module can also be used in other study programs (export module).

Die Wahlmöglichkeit des Moduls ist dadurch beschränkt, dass es der Praktischen Computer Science zugeordnet ist.


Recommended Reading

  • Clauda Eckert: IT-Sicherheit: Konzepte, Verfahren, Protokolle, Oldenbourg, 2009. Ross Anderson: Security Engineering, Wiley, 2008. William Stallings: Network Security Essentials, Pearson, 2011.



Please note:

This page describes a module according to the latest valid module guide in Winter semester 2018/19. Most rules valid for a module are not covered by the examination regulations and can therefore be updated on a semesterly basis. The following versions are available in the online module guide:

The module guide contains all modules, independent of the current event offer. Please compare the current course catalogue in Marvin.

The information in this online module guide was created automatically. Legally binding is only the information in the examination regulations (Prüfungsordnung). If you notice any discrepancies or errors, we would be grateful for any advice.