Hasso-Plattner-Institut
 
    • de
 

Lecture/course - english - Winter 2002/2003

In this lecture course questions are treated around Internet architecture and Internet-Security.

Chapter 1 gives an introduction into risk analysis of computer crime. In Chapter 2, the function mode and architecture of Internet and Intranets are discussed Then, in Part 3 of the lecture course, based on a well-funded understanding of the TCP/IP-protocol, weak points and targets of Internet and Intranets are discussed.

The lecture course starts on 29th October and finishes on 21th February. It takes two times 2 hours a week and is adapted for students of computer science, business computer science and mathematics, as well as for listeners who are interested in questions of Internet and Internet Security. The lecture course will be presented in English and transferred online as teleteaching into the Internet. Due to an agreement with the dean of the computer science department of the Beijing University of Technology ( Beijing Tech, China ), this lecture course is part of the curriculum of computer science students from this University too.

Authors

Prof. Dr. Christoph Meinel

Duration

32:49 hours

Relevant Links

RDF based lecture search (experimental)

0 Internet Bridge Trier-Beijing

Internet Security - WandT

An opening ceremony of the internet-bridge

01:03:58 hours | play >

1 Introduction

Introduction

Internet Security
- WandT-1

Nowadays' Internet Risks for Interconnected Information Systems
Systematic Problems with Internet Security
The Internet is an easy Target
Changing Nature of The Threats
Who are the Intruders
Improved Opportunities for Intrusion
Direction of Internet Security
Complexity of Internet
Most Common Attacks
Futher Attacks
Computer Crimes and Damage
Main Security Necessities

01:26:42 hours | play >

1 Risk Analysis

Internet Security
- WandT-2

Introduction
(1) Risks for information systems
(2) New risks with internet connection
(3) Security risks in intranet's
(4) Risk analysis
(5) Phases of Risk analysis: Overview
Phase 1: Fixing of the analysis domain
Phase 2: Acquisition of the risks
Phase 3: Evaluation of Risks
(6) Basic risks by using internet

01:29:21 hours | play >

2 Computer Crime: Criminals and Motives

Internet Security
- WandT-3

Potential attackers
(1) Staff of the Own Enterprise
(2) Hackers from High-Schools and Universities
(3) Hackers of the Computer-Underground
(4) Ordinary Criminals
(5) Cyber Crime: Professional Hackers

01:31:59 hours | play >

3 Hackers and Viruses

Internet Security - WandT-4

(1) The First Hackers
(2) Unterground-Mailboxes
(3) From First Virus to Worms and Trojan Horses
(4) Small Chronology of Computer-Crime
(5) Computer-Crime and the following Costs

01:01:55 hours | play >

2 Architecture of Internet and Intranet

Architecture of Internet and Intranets

Internet Security - WandT-5

General Introduction
(1) Basic Structure
(2) Internet and Intranets: Topology and Attack Points
(3) Secure Server Network
(4) Four big blocks of Internet software components

00:27:20 hours | play >

1 Internet Protocol - IP

Internet
Security - WandT-6

(1) IP - Fundamental Component of the Interne Protocol Suite
(2) Basic Princoples of the Internet-Protocol IP
(3) Format of IP-Packets
(4) Fragmentation of IP-Packets

00:40:10 hours | play >

2 + 3 TCP and UDP

Internet Security - WandT-7

2.2 Transmission Control Protocol - TCP
(1) TCP - Fundamental Internet-Transport-Protocol
(2) TCP - Guarantees Transmission
(3) Format of TCP-Packets
(4) TCP-Ports

2.3 User Datagram Protocol - UDP
(1) UDP - a simplified and less powerful variant of TCP

00:30:59 hours | play >

4 Internet Protocols for Serial Connections

Internet Security - WandT-8

(1) SLIP - Serial Line Internet Protocol
(2) PPP - Point to Point Protocol
1. PPP - Encapsulation
2. PPP - Link Control Protocol
3. PPP - Network Control Protocol

00:30:10 hours | play >

5 Addressing in IP-Networks

Internet Security - WandT-9

(1) Basic Idea
Structure of IP-Addresses
(2) Efficient Routing with Subnet-Address-Masks
(3) Private Address Domains

00:47:35 hours | play >

6 Internet Domain Name Service - DNS

Internet Security - WandT-10

(1) History
(2) DNS - Domain Name Structure
(3) DNS - Protocol

00:34:01 hours | play >

7 Internet Protocol Next Generation - IPv6

Internet Security - WandT-11

Overview
(1) Extension of Address-Space
(2) Address formats of IPv6
(3) Header Format of IPv6
(4) Migration IPv4 to IPv6

00:39:00 hours | play >

8 Security on Network Layer - IPSec

Internet Security - WandT-12

(1) IPSec-Standard
(2) IPSec-Standard and IPv6
(3) IPSec Functionality on IPv4

00:47:25 hours | play >

9 Networks with Several Locations

Internet Security - WandT-13

(1) Introduction
(2) WAN ( Wide Area Network ) - Connection
(3) RAS ( Remote Access Service ) - Connection
(4) VPN - Virtual Private Network

00:22:25 hours | play >

10 World Wide Web - WWW

Internet
Security - WandT-14

(1) Reminder of the Internet-Protocol family
(2) Architecture of the World Wide Web
(3) HTML-Documents
(4) URL Adressing scheme in the WWW
(5) HTTP Communication protocol in the WWW
(6) SSL and S-HTTP
(7) VRML - Virtual Reality Modelling Language
(8) Interactive Applications in the WWW
(9) MIME and Assistance applikations in the WWW

01:37:20 hours | play >

11 Electronical Post - E-Mail

Internet
Security - WandT-15

(1) Introduction
(2) Simple Mail Transfer Protocol - SMTP
(3) Multipurpose Internet Mail Extensions MIME
(4) Privacy Enhanced Mail - PEM
(5) S/MIME
(6) Pretty Good Privacy - PGP

01:11:13 hours | play >

12 Internet News

Internet Security - WandT-16

(1) Introduction
(2) Transfer of News
(3) New-Group-Hierarchy
(4) Network News Transport Protocol - NNTP

00:32:01 hours | play >

13 File Transfer Protocol - FTP

Internet Security - WandT-17

(1) Introduction
(2) Functional principle
(3) Anonym FTP
(4) Trivial FTP

00:26:44 hours | play >

14 Remote Login - Telnet

Internet Security - WandT-18

(1) Introduction
(2) Functionality

00:13:33 hours | play >

15 Directory Service - LDAP

Internet Security - WandT-19

(1) Idea of X.500 Directory Service
(2) Internet-Protocol LDAP
(3) Security of LDAP by SSL

00:38:18 hours | play >

16 Multimedia

Internet Security - WandT-20

Specific Problems of Multimedia
Some Examples

Book Recommendation for Chapter 2

00:14:42 hours | play >

3 Weaknesses and Targets

1 Human Factor and Technical Failures

Internet Security - WandT-21

(1) Technical Failures
(2) Defective Protocol Design
(3) Defective Software Design
(4) Lack of Knowledge and Carelessness
(5) Social Hacking
(6) Defective Organisation
(7) Unprotected Hardware
(8) Hit list of Break-in Methods

00:52:05 hours | play >

2 Spy Out Network Infrastructure

Internet Security - WandT-22

(1) Introduction
(2) Address Scanner
(3) Port Scanner
(4) Protocol-Analyzers
(5) Banners

00:37:38 hours | play >

3 Attacks on Accounts and Passwords

Internet Security - WandT-23

(1) Introduction
(2) Password Guessing
(3) Password Cracking
(4) Password Sniffing
(5) Password Monitoring
(6) Password "Fishing" with Trojan Horses
(7) Protection Against Password Theft

00:47:19 hours | play >

4 Attacking Internet Protocols (I)

Internet Security - WandT-24

(1) Introduction
(2) IP Address Spoofing
(3) ICMP-Attacks

00:38:30 hours | play >

5 Attacking Internet Protocols (II)

Internet
Security - WandT-25

(4) Internet-Routing-Attacks
(5) ARP-Attacks
(6) IP-Fragmenting-Attack
(7) IP-Bombing
(8) SYN-Flooding
(9) TCP-Sequence Numbers Attacks
(10) UDP Attacks

01:18:27 hours | play >

6 Attacking Internet Protocols (III)

Internet Security - WandT-26

(11) DNS-Attacks
(12) SMTP-Attacks
(13) Telnet-Attacks
(14) FTP-Attacks
(15) NNTP-Attacks

00:34:24 hours | play >

7 Misuse of Design and Programming Errors

Internet Security - WandT-27

(1) Introduction
(2) Buffer Overflow
(3) Defective Syntax Check
(4) Race Condition

00:36:11 hours | play >

8 Weaknesses in Unix/Linux (I)

Internet
Security - WandT-28

(1) Introduction
(2) Security Architecture of Unix
(3) Password Attacks in Unix
(4) Networks Attacks in Unix

01:27:27 hours | play >

9 Weaknesses in Unix/Linux (II)

Internet
Security - WandT-29

(5) Attacks over Unix-Applications
(6) Strategies for Protecting Unix
(7) Information for Unix-Security
(8) Strategies for Protecting Linux
(9) Security-Software for Linux

01:10:57 hours | play >

10 Weaknesses in Windows NT/2000 (I)

Internet
Security - WandT-30

(1) Introduction
(2) Security architecture of Windows NT/2000
(3) Account- and Password attacks
(4) Network attacks

01:14:20 hours | play >

11 Weaknesses in Windows NT/2000 (II)

Internet
Security - WandT-31

(5) Attacks over NT-Applications
(6) NT-Denial-of-Service-Attacks
(7) Strategies for security of NT-Systems
(8) Windows 3.11 / 95/ 98-Clients
(9) Information about NT-Security
(10) Windows 2000

00:49:34 hours | play >

12 Targets in the World Wide Web (I)

Internet
Security - WandT-32

(1) Introduction
(2) Target: Web-Browser
-- Spying out Personal Data
-- Java
-- JavaScript
-- ActiveX

01:07:32 hours | play >

13 Targets in the World Wide Web (II)

Internet
Security - WandT-33

-- Protecting Web-Browser

(3) Attacks on Web-Servers
(4) Configure Secure Web Server
(5) Secure Web: SSL and S-HTTP
(6) Dangerous Search machines

00:58:42 hours | play >

14 Viruses, Worms, Trojan Horses

Internet
Security - WandT-29

(1) Introduction
(2) Distribution of Viruses
(3) Attacks on Web-Servers
(4) Virus-Factories
(5) Anti-Virus-Management
(6) Anti-Virus-Software

01:25:04 hours | play >

Detection of Attacks and Intrusions

Internet
Security - WandT-34

(1) Introduction
(2) Anomalies and Attacks Signatures
(3) Implementation of Intrusion Detection Systems (IDS)
(4) Reaction on Attacks
(5) Intrusion Response
(6) Limitations of IDS

01:14:38 hours | play >

Legal and Ethical Issues

Internet
Security - WandT-35

(1) Introduction
(2) Legal Systems
(3) German Laws
(4) Case Studies
(5) Responsibility of IT-Managers
(6) Ethical Issues
(7) Case Studies
(8) Code of Ethics

01:09:46 hours | play >