Hasso-Plattner-Institut
Hasso-Plattner-Institut
  
Login
  • de
 

Internet-Security - Weaknesses and Targets (Wintersemester 2015/2016)

Dozent: Prof. Dr. Christoph Meinel (Internet-Technologien und -Systeme)
Tutoren: Marian Gawron Martin Ussath

Beschreibung

"Internet Security - Weaknesses and Targets" is based on "Internet- & WWW-Technologies" and gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion about the possibilities to detect attacks and intrusions and also describes ethical issues.

Online Exercise Registration: There are no printed list-forms on the whiteboards/blackboards for registering the exercise groups. Registration is possible fb10moodle using your HPI mail address.

Voraussetzungen

Contents of lecture "Internet- und WWW-Technologien" (esp. protocols) should be present.

Important Notice: We are NOT guiding you for hacking and participation in this seminar could NOT be an excuse for any kinds of your malicious actions towards unauthorized resources over Internet!!!

Literatur

  • Meinel/Sack: Grundlagen der Digitalen Kommunikation
  • Meinel/Sack: Internetworking - Technische Grundlagen und Anwendungen
  • Tanenbaum: Computer Networks
  • Stallings/Brown: Computer Security: Principles and Practice
  • Cheswick/Bellovin/Rubin: Firewalls and internet security. Repelling the Wily Hacker
  • Kaufman/Perlman/Speciner: Network Security: Private Communication in a Public World
  • Egan/Mather: Executive Guide to Information Security: Threats, Challenges, and Solutions
  • Stuttard/Pinto: The Web Application Hacker's Handbook - Discovering and Exploiting Security Flaws
  • Koziol/Litchfield/Aitel/Anley/Eren/Mehta/Hassel: The Shellcoder's Handbook - Discovering and Exploiting Security Holes

Lern- und Lehrformen

Lecture and exercise: Every week a 90 minutes lecture (in English) is held and streamed by tele-TASK over the internet. Students have to solve and submit their exercises bi-weekly.

Leistungserfassung

50% of the maximum exercise points (in 1st and 2nd half of semester) are needed to be able to take part in the examination at the end of the semester. In the middle of the semester there will be a written intermediate exam which counts about 1/3. Every student has to pass the intermediate exam to take the final exam and to successfully pass the course. At the end of the course there is a second written exam (counts about 2/3). Students who want to improve their mark can also register for an oral examination. Outstanding exercise results and participation in discussion can lead to a better mark.

Termine

For current dates always check the fb10moodle. We will announce appointments there. The preliminary dates are:

  • Examinations:

    • Mid-Term: 9:00-10:30, 16.12.2015, HS1
    • Final: 13:00-14:30, 11.02.2016, HS1

  • Hands-On experiences

    • 11.12.2015  09:15-10:45/11:00-12:30
    • 22.01.2016  09:15-10:45/11:00-12:30

  • Lecture dates:

    • Wednesday, 9:00, HS2

  • Exercise course dates (tentative):

    • Friday, 9:15, A-2.1
    • Friday, 11:00, A-2.1
    • Friday, 13:30, A-2.1

  • First Session will be on October 16th 2015


Note: Usually, new exercise assignments (exercise sheets) will be published every Wednesday on the lecture management system fb10moodle. Deadline for the submission of the solutions: Wednesday (two weeks after the publication) 12 o'clock or as specified in the assignment sheets.

Allgemeine Information

  • Semesterwochenstunden : 4
  • ECTS : 6
  • Benotet : Ja
  • Einschreibefrist : 23.10.2015
  • Programm : IT-Systems Engineering BA
  • Lehrform : VU
  • Belegungsart : Wahlpflicht
  • Maximale Teilnehmerzahl : 70

Module

  • Internet & Security Technology
  • Operating Systems & Information Systems Technology
  • ISAE-Grundlagen
  • ISAE-Vertiefung
  • OSIS-Grundlagen
  • OSIS-Vertiefung

Zurück