|Module name (EN): Security Engineering|
|Degree programme: Computer Science and Communication Systems, Bachelor, ASPO 01.10.2017|
|Module code: KIB-SE|
|Hours per semester week / Teaching method: 2V+2P (4 hours per week)|
|ECTS credits: 5|
|Mandatory course: yes|
|Language of instruction:
|Applicability / Curricular relevance:
DFIW-SE Computer Science and Web Engineering, Bachelor, ASPO 01.10.2019, semester 4, mandatory course
KIB-SE Computer Science and Communication Systems, Bachelor, ASPO 01.10.2017, semester 4, mandatory course
PIB-SE Applied Informatics, Bachelor, ASPO 01.10.2017, semester 4, mandatory course
60 class hours (= 45 clock hours) over a 15-week period.
The total student study time is 150 hours (equivalent to 5 ECTS credits).
There are therefore 105 hours available for class preparation and follow-up work and exam preparation.
|Recommended prerequisites (modules):
|Recommended as prerequisite for:
Prof. Dr. Damian Weber
Prof. Dr. Damian Weber
Sarah Theobald, M.Sc.
Dipl.-Inform. Marion Bohr
After successfully completing this module, students will be familiar with the critical parts, procedures and audit-relevant data of an operating system.
An open source UNIX system will be used in order to be able to comprehensively analyze
processes, security gaps and system calls in detail. The knowledge of these components and their
weak points will enable the students to pursue a security-by-design approach for new application systems or the configuration
of operating systems, which prevents vulnerabilities from the outset.
This includes basic knowledge of current cryptography methods. Students will learn to integrate the social necessity of data protection and privacy protection in communication processes into their future concepts.
1. Security terms, threat model, examples
2. Identities, authentication, authorization
3. Encryption (symmetric, asymmetric)
4. Cryptographic hash functions, message authentication codes
5. UNIX from a security perspective
6. Auditing, system status, system statistics
7. Network security, perimeter security
8. Penetration tests
|Recommended or required reading:
D. Kim, M. G. Solomon, Fundamentals Of Information Systems Security, 2016
G. Weidman, Penetration Testing: A Hands-On Introduction to Hacking, 2014
|Module offered in: |
SS 2022, SS 2021, SS 2020, SS 2019
[Sun Jan 23 04:52:26 CET 2022, CKEY=ksc, BKEY=ki2, CID=KIB-SE, LANGUAGE=en, DATE=23.01.2022]