Informations- und Kommunikationssicherheit: Infrastrukturen, Technologien und Geschäftsmodelle
Basic Information
Type of Lecture: | Lecture with Exercise |
---|---|
Course: | Master |
Hours/Week: | 4 |
Credit Points: | 6 |
Language: | English |
Term: | Winter 2014/2015 |
Lecturers: | Prof. Dr. Kai Rannenberg Dr. Fatbardh Veseli Dr. Ahmed-Seid Yesuf Christopher Schmitz M.Sc. |
Email: |
Content of the Course
Description:
The "Information and Communication Security" lecture series provides a general introduction to the topic of information and communication security. Students will be qualified to identify security challenges that come along with using and employing information and communication systems, and to identify and apply adequate means and methods to solve them. Emphasis will be put on the organizational and technical set-up of infrastructures, also including aspects of pragmatic and professional risk management, and profitability analysis of security concepts and technologies. Further, students will be qualified to identify and assess security risks, in order to develop and establish appropriate security strategies. Contents presented in the lecture will also be discussed in the context of international standardization and regulation activities in the domain of information and communication security, allowing students to consider long-term developments, trends, and challenges in their analysis.
Agenda:
Time and Place:
-
-
-
- Di, 14:00-16:00, HZ 15 (Hörsaalzentrum)
- Mi, 10:00-12:00, HZ 15 (Hörsaalzentrum)
-
-
The Tuesday lecture series will take place every second week, whereas the Wednesday series will take place every week. In addition, there will be no lecture during the official holiday periods as published by the university
-
-
-
- Tuesday, 14.04.2015 14:00-16:00 in HZ 7
VL01 - Introduction - Tuesday, 21.04.2015 14:00-16:00 in HZ 7
VL02 - Authentication - Wednesday, 22.04.2015 10:00-12:00 in HZ 7
VL03 - Access Control - Tuesday, 28.04.2015 14:00-16:00 in HZ 7
UE01 - Authentication - Tuesday, 05.05.2015 14:00-16:00 in HZ 7
VL04 - Cryptography I - Wednesday, 06.05.2015 10:00-12:00 in HZ 7
VL05 - Cryptography II - Tuesday, 12.05.2015 14:00-16:00 in HZ 7
UE02 - Guest Lecture 1 - Juergen Kuehn - Biometrics - Tuesday, 19.05.2015 14:00-16:00 in HZ 7
UE03 - Access Control - Wednesday, 20.05.2015 10:00-12:00 in HZ 7
VL06 - Electronic Signatures - Tuesday, 26.05.2015 14:00-16:00 in HZ 7
UE04 - Cryptography - Tuesday, 02.06.2015 14:00-16:00 in HZ 7
VL07 - Identity Management - Wednesday, 03.06.2015 10:00-12:00 in HZ 7
VL08 - Privacy protection - Tuesday, 09.06.2015 14:00-16:00 in HZ 7
VL09 - Computer System Security - Tuesday, 16.06.2015 14:00-16:00 in HZ 7
VL10 - Network Security I - Wednesday, 17.06.2015 10:00-12:00 in HZ 7
VL11 - Network Security II - Tuesday, 23.06.2015 14:00-16:00 in HZ 7
VL12 - Guest lecture 2 - Ronny John - Security Management - Payment Security - Tuesday, 30.06.2015 14:00-16:00 in HZ 7
UE05 - Guest lecture 3 - Dr.Daniel Hamburg - Pentesting - Wednesday, 01.07.2015 10:00-12:00 in HZ 7
UE06 - Guest Lecture 4 - Jens Eichler - Social engineering - Tuesday, 07.07.2015 14:00-16:00 in HZ 7
VL13 - Security Engineering - Tuesday, 14.07.2015 14:00-16:00 in HZ 7
VL14 - Evaluation Criteria - Wednesday, 15.07.2015 10:00-12:00 in HZ 7
UE07 - Exam prep and wrap up
- Tuesday, 14.04.2015 14:00-16:00 in HZ 7
-
-
Downloads:
-
-
-
- Exercise 1 - Authentication
(17.10.2014, 2.515 KB) - Exercise 1 - Authentication - Solution
(22.10.2014, 3.658 KB) - Exercise 2 - Access Control
(03.11.2014, 149 KB) - Exercise 2 - Access Control - Solutions
(05.11.2014, 383 KB) - Exercise 3 - Cryptography
(26.11.2014, 238 KB) - Exercise 3 - Cryptography - Solutions
(03.12.2014, 1.199 KB) - Guest lecture 01 - Jürgen Kühn: Biometrics
(19.11.2014, 2.308 KB) - Lecture 01 - Introduction (Updated)
(08.10.2014, 2.513 KB) - Lecture 02 - Authentication
(08.10.2014, 5.004 KB) - Lecture 03 - Access Control
(27.10.2014, 1.473 KB) - Lecture 04 - Cryptography I (Updated)
(28.10.2014, 2.051 KB) - Lecture 05 - Cryptography II
(28.10.2014, 1.636 KB) - Lecture 06 - Electronic Signatures (updated)
(19.11.2014, 2.585 KB) - Lecture 07 - Identity Management (updated)
(25.11.2014, 6.478 KB) - Lecture 08 - Privacy Protection (Updated)
(25.11.2014, 4.139 KB) - Lecture 09 - Computer System Security
(08.12.2014, 2.790 KB) - Lecture 10 - Network Security I
(08.12.2014, 1.951 KB) - Lecture 11 - Network Security II
(15.12.2014, 3.489 KB) - Lecture 12 - Information Security Management
(14.01.2015, 1.373 KB) - Lecture 13 - Security Engineering [Updated]
(02.02.2015) - Guest Lecture 02 - Jens Eichler: Social engineering
- Guest Lecture 03 - Dr. Stefan Weiss: Privacy-by-design - Challenges in global information communication systems
- Lecture 14 - Evaluation Criteria [Updated]
(02.02.2015) - Guest Lecture 04 - Dr. Daniel Hamburg: Pentests – More than just using the proper tools
(02.02.2015) - Exercise 04 - Exam prep and wrap up
(17.02.2015)
- Exercise 1 - Authentication
-
-
Exam
Information: