Main content
This entry is from Winter semester 2019/20 and might be obsolete. You can find a current equivalent here.
CS 515 — IT-Security
(dt. IT-Sicherheit)
Level, degree of commitment | Advanced module, depends on importing study program |
Forms of teaching and learning, workload |
Lecture (4 SWS), recitation class (2 SWS), 270 hours (90 h attendance, 180 h private study) |
Credit points, formal requirements |
9 CP Course requirement(s): Successful completion of at least 50 percent of the points from the weekly exercises as well as at least 2 presentations of the tasks. Examination type: Oral or written examination |
Language, Grading |
German,The grading is done with 0 to 15 points according to the examination regulations for the degree program B.Sc. Computer Science. |
Origin | B.Sc. Computer Science |
Duration, frequency |
One semester, In der Regel jedes zweite Wintersemester |
Person in charge of the module's outline | Prof. Dr. Bernd Freisleben |
Contents
The lecture deals with methods, tools and processes for the development of software systems that should be secure and reliable against malicious attacks and wrong inputs. The following topics will be covered:
1. cryptography
2. authentication & access control
3. vulnerability classes
4. OS security
5. mobile device security
6. network security
7. network attacks
8. malicious software
9. reverse engineering
10. web security
11. privacy
Qualification Goals
The aim of the module is to enable listeners to understand malicious attacks on software systems. After visiting the module, listeners should be able to design and implement secure software systems. The students practice scientific working methods (recognizing, formulating, solving problems, training abstract ability) and train oral communication skills in the exercises by practicing free speech in front of an audience and during discussion.
Prerequisites
None. The competences taught in the following modules are recommended: Object-oriented Programming, either Algorithms and Data Structures or Practical Informatics II: Data Structures and Algorithms for Pre-Service-Teachers, System Software and Computer Communication.
Applicability
The module can be attended at FB12 in study program(s)
- B.Sc. Data Science
- B.Sc. Computer Science
- B.Sc. Business Informatics
- M.Sc. Data Science
- M.Sc. Computer Science
- M.Sc. Mathematics
- M.Sc. Business Informatics
- M.Sc. Business Mathematics
- LAaG Computer Science
When studying B.Sc. Computer Science, this module can be attended in the study area Compulsory Elective Modules in Computer Science.
The module can also be used in other study programs (export module).
Die Wahlmöglichkeit des Moduls ist dadurch beschränkt, dass es der Praktischen Computer Science zugeordnet ist.
Recommended Reading
- Clauda Eckert: IT-Sicherheit: Konzepte, Verfahren, Protokolle, Oldenbourg, 2009. Ross Anderson: Security Engineering, Wiley, 2008. William Stallings: Network Security Essentials, Pearson, 2011.
Please note:
This page describes a module according to the latest valid module guide in Winter semester 2019/20. Most rules valid for a module are not covered by the examination regulations and can therefore be updated on a semesterly basis. The following versions are available in the online module guide:
- Winter 2016/17
- Summer 2018
- Winter 2018/19
- Winter 2019/20
- Winter 2020/21
- Summer 2021
- Winter 2021/22
- Winter 2022/23
- Winter 2023/24
The module guide contains all modules, independent of the current event offer. Please compare the current course catalogue in Marvin.
The information in this online module guide was created automatically. Legally binding is only the information in the examination regulations (Prüfungsordnung). If you notice any discrepancies or errors, we would be grateful for any advice.