Introduction to Computer Security
General
Semester | Winter 2015/2016 |
Lecturer | Prof. Dr. Konrad Rieck |
Assistant | Christian Wressnegger, Fabian Yamaguchi |
Course type | Lecture (UniVZ) |
Modules | B.Inf.1708, M.Inf.1127 |
ECTS (SWS) | 5 (3) |
Date | Lecture: Wed, 16–18 Exercise: Thu, 14–16 |
Location | Lecture: Room MN09 (Geography) Exercise: Room MN15 (Geography) |
Start | Lecture: 28.10.2015 Exercise: 29.10.2015 |
E-Learning | Lecture and exercise are streamed |
Audience | Applied Computer Science BSc Applied Computer Science MSc ITIS MSc |
Description
This lecture deals with principles of computer and network security. The course covers basic concepts of security and introduces common attacks and defenses. Topics of the course include basic cryptography, authentication and authorization, network security, web security, software security and malicious software.
Mailing List
There is a mailing list for the lecture. News and updates regarding the schedule are posted to this list. Furthermore, the list allows students to discuss topics of the lecture. You should register here. An archive of the list is available here.
Preliminary Schedule
- M. Bishop: Computer Security - Art and Science. Macmillian Publishing, 2002
- D. Gollmann: Computer Security. Wiley & Sons, 2011
- C. Eckert: IT-Sicherheit: Konzepte - Verfahren - Protokolle. Oldenbourg, 2006
- B. Schneier: Applied Cryptography. Wiley & Sons, 1995
- P. Szor: The Art of Computer Virus Research and Defense. Addison-Wesley, 2005
Date | Topic | Slides | Sheets |
28.10. 16:00 | Introduction | ● | |
29.10. 14:00 | Python Tutorial | ● | 1 |
04.11. 16:00 | Symmetric-Key Cryptography | ● | 2 |
11.11. 16:00 | — No lecture — | ||
19.11. 14:00 | Public-Key Cryptography | ● | 3 |
25.11. 16:00 | Excursus: Web Security | ● | 4 |
02.12. 16:00 | Guest: Secure Web Communication (B. Braun) | ● | 4b |
09.12. 16:00 | Hybrid Cryptosystems | ● | 5 |
16.12. 16:00 | Authentication and Access Control | ● | 6 |
17.12. 14:00 | Exercise with Keysigning Party | ||
23.12. 16:00 | Guest: Code Stylometry (A. Caliskan-Islam) | ● | |
06.01. 16:00 | Network Attacks and Defenses | ● | 7 |
13.01. 16:00 | Vulnerabilities and Exploits | ● | 8 |
20.01. 16:00 | Malicious Software (Malware) | ● | 9 |
27.01. 16:00 | Intrusion and Malware Detection | ● | |
03.02. 16:00 | Guest: Anti-APT-Strategies (F. Boldewin) | ||
10.02. 16:00 | — Written exam — |
Exercises and Exam
This is a lecture with exercises. You need to solve 50% of the exercise sheets to take part in the written exam. Please follow our exercise guidelines. The exam will take place on 10.02.2016 from 16:00–18:00. You need to register for the exam with the examination office. The exam will be in English.
Results
SHA1 of matriculation number | Grade | Points |
027a7888f5f327fee45a967a6bd3968b42136a12 | 3.3 | 18.5 |
064df9e5cb6e2feaa6588706ea772e8241e12935 | 1.7 | 30.4 |
0875645c9e3232b25b827e05b05800974cfaee62 | 2.3 | 25.9 |
09d63636897108d622b2bc2882e08ec80aae14ac | 2.3 | 26.6 |
1235f7ab3591bdf86a7609eb3118800c63198ce3 | 2.0 | 27.9 |
14ca025442cf430a085e439e1213a692bc9ee4b3 | 2.7 | 23.1 |
1d0a24dd34f035d2ead346e99079724f002bfb45 | 3.3 | 18.5 |
1d188fe792032d429dd0989dca97c5e4982cd159 | 3.0 | 22.4 |
20b57bc8394dd7e20ea3f6e533d261d955c6d349 | 3.0 | 21.7 |
22dde23aad849e75f45b3b867060564c8ff3a933 | 5.0 | 12.6 |
2d2317d3c6e49170b86fc8744a8a9fcc3cb9c271 | 2.3 | 26.5 |
2ea1ad22074abc1e3677f4ae4d04615be2ab2246 | 2.3 | 26.7 |
3549d8e7b4d32ebd739cdc3d2f453b8cb01446fb | 3.7 | 17.0 |
38535b60a2a69a04aedf4680fc0201990510cd45 | 2.0 | 28.1 |
40ab125ae5b54600d69a25ad70df0878d629a6a9 | 2.0 | 29.1 |
44de8d85e7f798e3167eefb9a6455771e79b7be9 | 2.3 | 26.9 |
4dd0de9203ad66ab48477f68fab784f298e27658 | 1.7 | 29.7 |
4ea8adc8451b7b66dec9c726319be9bddc905129 | 3.7 | 16.5 |
5c7c2bd559dd9f44ceefcfaed1bec71a7abfc72e | 4.0 | 15.8 |
640ce60813a2f1e36d98b755bd50e0399b789caa | 2.7 | 24.6 |
7c1d0216b14e645aaf379a3f59aea647a5413d08 | 3.3 | 18.5 |
7d0ff70aedaa4bde558f2d5cecceb7ea433ed628 | 2.3 | 26.4 |
80338b15e8b35f3acd704a8443abdf5f7ea77d80 | 2.7 | 23.1 |
80b1c4c0c84450d512febdd12e42a94dbc02efe5 | 2.0 | 28.0 |
82477eb2006f159b381ff3845b0139a1d7eb50be | 3.7 | 17.1 |
8394f5b090a2145692305d5b430f46a499590436 | 3.0 | 22.5 |
871232b2c4bc01670692fd218dd84513f6aadae5 | 2.7 | 23.6 |
8e1ab7756693dc4438f72f865355b91d0ce831b1 | 2.7 | 24.8 |
996d95c9edbb07d86e7c5b1e63a8a7013abf455e | 1.7 | 29.9 |
b74c8f12030d547d478239f0e234e8cde2f20448 | 2.3 | 25.2 |
bc326611000027ea02d003bdb88c8801459fc22a | 5.0 | 13.6 |
be43bb3e9701eec98636316a7efafeaa4c1c35d6 | 3.0 | 21.4 |
c21cd487a47629c6059cd77d4084e6cfaa7c3739 | 3.7 | 16.8 |
c3fd02b5e7c4cfccc9cdfdaac862472cbe8072ac | 5.0 | 13.2 |
c950c52dcb44dc8deae4bd3a701def78fb6e7c18 | 2.0 | 28.8 |
cde55759431e1f8e710f0c9b7aa8d4930cee955b | 1.7 | 29.5 |
cea4a38733588fe50075851f86821d3dbdb40459 | 3.7 | 16.6 |
e907a1a1702f88aa662f5350b01b7fdee2071961 | 2.3 | 26.5 |
e9aef7594dbc2e4d48eea65c9fb5d364a72a5095 | 2.3 | 26.8 |
ec17a20f64ab111bcd9314503e158dd55fd4bada | 2.0 | 27.6 |
edd7131620a828998404ab90147491c750263a9d | 2.3 | 25.3 |
f668ee05a65de1c8916e78d78ad79b72549a16ad | 5.0 | 13.4 |
f6cbc16e4f4e8236f320032d7b6ba1376a3539a6 | 2.7 | 24.5 |
f8457f0dcdbda56670d3ea8b8b53b4e10346b14e | 3.7 | 17.2 |
f9033e38d2fe8af835e782a29d079d7ed276e4ab | 3.3 | 20.0 |
f9d31ba8b5a516d339b9a811ab8446799edcf093 | 2.7 | 23.6 |
fc6833682b874da8fa432f6d5238c600b42dfa15 | 1.3 | 32.6 |
E-Learning
The lecture and exercises are streamed live via Adobe Connect. A recording is not available. You can join the video stream at https://webconf.vc.dfn.de/sec-ics/.