Course Computer Science 3


Responsible: Prof. Dr.-Ing. Arnulph Fuhrmann

Course

Meets requirements of following modules(MID)

Course Organization

Version
created 2011-11_09
VID 1
valid from WS 2012/13
valid to
Course identifiers
Long name Computer Science 3
CID F07_INF3
CEID (exam identifier)

Contact hours per week (SWS)
Lecture 3
Exercise (unsplit)
Exercise (split) 2
Lab
Project
Seminar
Tutorial(voluntary)
Total contact hours
Lecture 45
Exercise (unsplit)
Exercise (split) 30
Lab
Project
Seminar
Tutorial (voluntary)
Max. capacity
Exercise (unsplit)
Exercise (split)
Lab
Project
Seminar

Total effort (hours): 210

Instruction language

  • German or English

Study Level

  • Undergraduate

Prerequisites

  • Computer Science 1
  • Computer Science 2

Textbooks, Recommended Reading

  • R. Schreiner: Computernetzwerke -- Von den Grundlagen zur Funktion und Anwendung, Carl Hanser Verlag, 2009
  • A. S. Tanenbaum, D. Wetherall: Computer Networks, Prentice Hall, 2010
  • J. Schwenk: Sicherheit und Kryptographie im Internet -- Von sicherer E-Mail bis zu IP-Verschlüsselung, Vieweg+Teubner, 2010
  • C. Paar, J. Pelzl: Understanding Cryptography: A Textbook for Students and Practitioners, Springer, 2009
  • C. Eckert: IT-Sicherheit: Konzepte - Verfahren - Protokolle, Oldenbourg, 2009
  • R. J. Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems, John Wiley & Sons, 2008
  • C. Sorge, N. Gruschka, L. Lo Iacono: Sicherheit in Kommunikationsnetzen, Oldenbourg, 2013

Instructors

  • Prof. Dr.-Ing. Arnulph Fuhrmann
  • Prof. Dr.-Ing. Luigi Lo Iacono

Supporting Scientific Staff

  • tba

Transcipt Entry

Computer Science 3

Assessment

Type
sK sK unmittelbar nach LV: Note aus Punktzahl der sK (70%) und aus bK (30%)
sK sK nicht unmittelbar nach LV: Note allein aus sK

Total effort [hours]
sMP 10

Frequency: 2-3/year


Course components

Lecture/Exercise

Objectives

Contents
  • communication systems and computer networks
    • ISO/OSI modell
    • IP, TCP, UDP, DNS, HTTP, REST, SOAP
  • communication and information security
    • threats, risks, security goals, security services, security analysis
    • cryptography
      • symmetric schemes
      • asymmetric schemes
      • hash functions
      • protocols and infrastructures
    • communication security
      • authentication protocols
        • Kerberos
        • SAML
        • OpenID
        • OAuth
      • secure channels
        • SSL/TLS
        • SSH
        • WS-Security
    • information security
      • authentication mechanisms
      • autorisation mechanisms
      • document-oriented security

Acquired Skills
  • design and implementation of communication systems for media-intensive applications
    • classification of protocolls and communication systems in accordance with reference models
    • implementation, configuration and analysation of protocols and communication systems
  • design and implementation of security systems for media-intensive applications
    • application of cryptographic primitives
    • selection of cryptographic primitives suitable for a given purpose

Additional Component Assessment

Type
bK Klausur nach ca. 8 Wochen
bÜA Präsenzübung und Selbstlernaufgaben

Contribution to course grade
bK 30% der Punkte für unmittelbar abschließende sK
bÜA unbenotet, Voraussetzung für Teilnahme an sK

Frequency: 1/year

Diese Seite läuft auf FoswikiDas Urheberrecht © liegt bei den mitwirkenden Autoren. Alle Inhalte dieser Kollaborations-Plattform sind Eigentum der Autoren.
Ideen, Anfragen oder Probleme bezüglich Foswiki? Feedback senden