Computer Security

Introduction to Computer Security


10K students

General


SemesterWinter 2015/2016
LecturerProf. Dr. Konrad Rieck
AssistantChristian Wressnegger, Fabian Yamaguchi
Course typeLecture (UniVZ)
ModulesB.Inf.1708, M.Inf.1127
ECTS (SWS)5 (3)
DateLecture: Wed, 16–18
Exercise: Thu, 14–16
LocationLecture: Room MN09 (Geography)
Exercise: Room MN15 (Geography)
StartLecture: 28.10.2015
Exercise: 29.10.2015
E-LearningLecture and exercise are streamed
AudienceApplied Computer Science BSc
Applied Computer Science MSc
ITIS MSc

Description


This lecture deals with principles of computer and network security. The course covers basic concepts of security and introduces common attacks and defenses. Topics of the course include basic cryptography, authentication and authorization, network security, web security, software security and malicious software.

Mailing List


There is a mailing list for the lecture. News and updates regarding the schedule are posted to this list. Furthermore, the list allows students to discuss topics of the lecture. You should register here. An archive of the list is available here.

Preliminary Schedule

     Date Topic Slides Sheets
     28.10. 16:00  Introduction
     29.10. 14:00  Python Tutorial1
     04.11. 16:00  Symmetric-Key Cryptography2
     11.11. 16:00  — No lecture —
     19.11. 14:00  Public-Key Cryptography3
     25.11. 16:00  Excursus: Web Security4
     02.12. 16:00  Guest: Secure Web Communication (B. Braun)4b
     09.12. 16:00  Hybrid Cryptosystems5
     16.12. 16:00  Authentication and Access Control6
     17.12. 14:00  Exercise with Keysigning Party
     23.12. 16:00  Guest: Code Stylometry (A. Caliskan-Islam)
     06.01. 16:00  Network Attacks and Defenses7
     13.01. 16:00  Vulnerabilities and Exploits8
     20.01. 16:00  Malicious Software (Malware)9
     27.01. 16:00  Intrusion and Malware Detection
     03.02. 16:00  Guest: Anti-APT-Strategies (F. Boldewin)
     10.02. 16:00  — Written exam —

    Exercises and Exam


    This is a lecture with exercises. You need to solve 50% of the exercise sheets to take part in the written exam. Please follow our exercise guidelines. The exam will take place on 10.02.2016 from 16:00–18:00. You need to register for the exam with the examination office. The exam will be in English.

    Results

       SHA1 of matriculation number Grade Points
      027a7888f5f327fee45a967a6bd3968b42136a123.318.5
      064df9e5cb6e2feaa6588706ea772e8241e129351.730.4
      0875645c9e3232b25b827e05b05800974cfaee622.325.9
      09d63636897108d622b2bc2882e08ec80aae14ac2.326.6
      1235f7ab3591bdf86a7609eb3118800c63198ce32.027.9
      14ca025442cf430a085e439e1213a692bc9ee4b32.723.1
      1d0a24dd34f035d2ead346e99079724f002bfb453.318.5
      1d188fe792032d429dd0989dca97c5e4982cd1593.022.4
      20b57bc8394dd7e20ea3f6e533d261d955c6d3493.021.7
      22dde23aad849e75f45b3b867060564c8ff3a9335.012.6
      2d2317d3c6e49170b86fc8744a8a9fcc3cb9c2712.326.5
      2ea1ad22074abc1e3677f4ae4d04615be2ab22462.326.7
      3549d8e7b4d32ebd739cdc3d2f453b8cb01446fb3.717.0
      38535b60a2a69a04aedf4680fc0201990510cd452.028.1
      40ab125ae5b54600d69a25ad70df0878d629a6a92.029.1
      44de8d85e7f798e3167eefb9a6455771e79b7be92.326.9
      4dd0de9203ad66ab48477f68fab784f298e276581.729.7
      4ea8adc8451b7b66dec9c726319be9bddc9051293.716.5
      5c7c2bd559dd9f44ceefcfaed1bec71a7abfc72e4.015.8
      640ce60813a2f1e36d98b755bd50e0399b789caa2.724.6
      7c1d0216b14e645aaf379a3f59aea647a5413d083.318.5
      7d0ff70aedaa4bde558f2d5cecceb7ea433ed6282.326.4
      80338b15e8b35f3acd704a8443abdf5f7ea77d802.723.1
      80b1c4c0c84450d512febdd12e42a94dbc02efe52.028.0
      82477eb2006f159b381ff3845b0139a1d7eb50be3.717.1
      8394f5b090a2145692305d5b430f46a4995904363.022.5
      871232b2c4bc01670692fd218dd84513f6aadae52.723.6
      8e1ab7756693dc4438f72f865355b91d0ce831b12.724.8
      996d95c9edbb07d86e7c5b1e63a8a7013abf455e1.729.9
      b74c8f12030d547d478239f0e234e8cde2f204482.325.2
      bc326611000027ea02d003bdb88c8801459fc22a5.013.6
      be43bb3e9701eec98636316a7efafeaa4c1c35d63.021.4
      c21cd487a47629c6059cd77d4084e6cfaa7c37393.716.8
      c3fd02b5e7c4cfccc9cdfdaac862472cbe8072ac5.013.2
      c950c52dcb44dc8deae4bd3a701def78fb6e7c182.028.8
      cde55759431e1f8e710f0c9b7aa8d4930cee955b1.729.5
      cea4a38733588fe50075851f86821d3dbdb404593.716.6
      e907a1a1702f88aa662f5350b01b7fdee20719612.326.5
      e9aef7594dbc2e4d48eea65c9fb5d364a72a50952.326.8
      ec17a20f64ab111bcd9314503e158dd55fd4bada2.027.6
      edd7131620a828998404ab90147491c750263a9d2.325.3
      f668ee05a65de1c8916e78d78ad79b72549a16ad5.013.4
      f6cbc16e4f4e8236f320032d7b6ba1376a3539a62.724.5
      f8457f0dcdbda56670d3ea8b8b53b4e10346b14e3.717.2
      f9033e38d2fe8af835e782a29d079d7ed276e4ab3.320.0
      f9d31ba8b5a516d339b9a811ab8446799edcf0932.723.6
      fc6833682b874da8fa432f6d5238c600b42dfa151.332.6

      results


      E-Learning


      The lecture and exercises are streamed live via Adobe Connect. A recording is not available. You can join the video stream at https://webconf.vc.dfn.de/sec-ics/.

      References

      • M. Bishop: Computer Security - Art and Science. Macmillian Publishing, 2002
      • D. Gollmann: Computer Security. Wiley & Sons, 2011
      • C. Eckert: IT-Sicherheit: Konzepte - Verfahren - Protokolle. Oldenbourg, 2006
      • B. Schneier: Applied Cryptography. Wiley & Sons, 1995
      • P. Szor: The Art of Computer Virus Research and Defense. Addison-Wesley, 2005