Course Computer Science 3
Responsible: Prof. Dr.-Ing. Arnulph Fuhrmann
Course
Meets requirements of following modules(MID)
Course Organization
Version |
created |
2011-11_09 |
VID |
1 |
valid from |
WS 2012/13 |
valid to |
|
|
|
Course identifiers |
Long name |
Computer Science 3 |
CID |
F07_INF3 |
CEID (exam identifier) |
|
|
Contact hours per week (SWS) |
Lecture |
3 |
Exercise (unsplit) |
|
Exercise (split) |
2 |
Lab |
|
Project |
|
Seminar |
|
Tutorial(voluntary) |
|
|
|
Total contact hours |
Lecture |
45 |
Exercise (unsplit) |
|
Exercise (split) |
30 |
Lab |
|
Project |
|
Seminar |
|
Tutorial (voluntary) |
|
|
|
Max. capacity |
Exercise (unsplit) |
|
Exercise (split) |
|
Lab |
|
Project |
|
Seminar |
|
|
Total effort (hours): 210
Instruction language
Study Level
Prerequisites
- Computer Science 1
- Computer Science 2
Textbooks, Recommended Reading
- R. Schreiner: Computernetzwerke -- Von den Grundlagen zur Funktion und Anwendung, Carl Hanser Verlag, 2009
- A. S. Tanenbaum, D. Wetherall: Computer Networks, Prentice Hall, 2010
- J. Schwenk: Sicherheit und Kryptographie im Internet -- Von sicherer E-Mail bis zu IP-Verschlüsselung, Vieweg+Teubner, 2010
- C. Paar, J. Pelzl: Understanding Cryptography: A Textbook for Students and Practitioners, Springer, 2009
- C. Eckert: IT-Sicherheit: Konzepte - Verfahren - Protokolle, Oldenbourg, 2009
- R. J. Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems, John Wiley & Sons, 2008
- C. Sorge, N. Gruschka, L. Lo Iacono: Sicherheit in Kommunikationsnetzen, Oldenbourg, 2013
Instructors
- Prof. Dr.-Ing. Arnulph Fuhrmann
- Prof. Dr.-Ing. Luigi Lo Iacono
Supporting Scientific Staff
Transcipt Entry
Computer Science 3
Assessment
Type |
sK |
sK unmittelbar nach LV: Note aus Punktzahl der sK (70%) und aus bK (30%) |
sK |
sK nicht unmittelbar nach LV: Note allein aus sK |
Total effort [hours] |
sMP |
10 |
Frequency: 2-3/year
Course components
Lecture/Exercise
Objectives
Contents
- communication systems and computer networks
- ISO/OSI modell
- IP, TCP, UDP, DNS, HTTP, REST, SOAP
- communication and information security
- threats, risks, security goals, security services, security analysis
- cryptography
- symmetric schemes
- asymmetric schemes
- hash functions
- protocols and infrastructures
- communication security
- authentication protocols
- Kerberos
- SAML
- OpenID
- OAuth
- secure channels
- information security
- authentication mechanisms
- autorisation mechanisms
- document-oriented security
Acquired Skills
- design and implementation of communication systems for media-intensive applications
- classification of protocolls and communication systems in accordance with reference models
- implementation, configuration and analysation of protocols and communication systems
- design and implementation of security systems for media-intensive applications
- application of cryptographic primitives
- selection of cryptographic primitives suitable for a given purpose
Additional Component Assessment
Type |
bK |
Klausur nach ca. 8 Wochen |
bÜA |
Präsenzübung und Selbstlernaufgaben |
Contribution to course grade |
bK |
30% der Punkte für unmittelbar abschließende sK |
bÜA |
unbenotet, Voraussetzung für Teilnahme an sK |
Frequency: 1/year
Das Urheberrecht © liegt bei den mitwirkenden Autoren. Alle Inhalte dieser Kollaborations-Plattform sind Eigentum der Autoren.
Ideen, Anfragen oder Probleme bezüglich Foswiki?
Feedback senden