Tele-Teaching Lecture for Beijing University of Technology (BJUT)
Winter Semester 2015/16
Introducation
Internet Security - Weaknesses and Targets" gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Besides, more introductions are provided on: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture concludes with the discussion on possibilities to detect attacks and intrusions and ethical issuses are introduced as well.
Organisation
Every week 2 lecture units, each with bout 90 minutes (in english) are streamed over the internet. There will be an exercise sheet assigned every two weeks. At the end of the course there is an oral exam to evaluate each student.
Lecturer
Tutors
Date: Friday, 13:30 - 17:00 (Beijing Time)
Place:
- tele-TASK.de, HPI, Potsdam, Germany
- tele-MEDIA (only available within BJUT campus network), BJUT, Beijing, China
Plan (last update: 21.12.2015):
- 06.11.2015
- Internet Security: An Overview
- First Understanding of Internet and WWW
- 13.11.2015
- Risk Analysis
- Cyber Crime: Potential Attacks
- Hackers and Viruses
- Give-out: The first Assignment
- 20.11.2015
- Human Factor and Technical Failures
- (Online) Reconnaissance
- OS Fingerprinting
- Attacks on Accounts and Passwords
- 27.11.2015
- Weaknesses of Internet Protocols (1/2)
- Weaknesses of Internet Protocols (2/2)
- 04.12.2015
- Design and Programming Errors
- Weaknesses in Unix/Linux
- Weaknesses in Windows and Mac OS X
- Give-out: the second Assignment
- 11.12.2015
- Weaknesses in the World Wide Web (1/2)
- Weaknesses in the World Wide Web (2/2)
- 18.12.2015
- Wireless Security
- Detection of Attacks and Intrusions
- Legal and Ethical Issues in Internet Security
- Give-out: the third Assignment
Onsite Q&A and Oral Examination
The third week in March 2016
Literature:
- Meinel/Sack: 数字通信技术, Tsinghua Press, Beijing, 2015 (in Chinese)
- Meinel/Sack: WWW-Kommunikation, Internetworking, Web-Technologien, Springer, Heidelberg, 2004. (in German)
- Meinel/Sack: WWW-Internet、Web技术及应用, Hope Press, Beijing, 2008 (in Chinese)
- Stuttard/Pinto: The Web Application Hacker's Handbook - Discovering and exploiting security holes
- Koziol/Litchfield/Aitel/Anley/Eren/Mehta/Hassel: The Shellcoder's Handbook - Discovering and exploiting security holes
- The Internet
History
This is the 14th transmission of this tele-lecture. You can find the old materials here:
- WS2014/15, WS2013/14, SS2013,
- WS2011/12, WS2010/11, WS2009/10, WS2008/09, WS2007/08,
- WS2006/07, WS2005/06, WS2004/05, WS2003/04, WS2002/03