Inhalt
[ INMAWKVSAPP ] KV Security in Application Protocols
|
|
|
|
(*) Unfortunately this information is not available in english. |
|
Workload |
Education level |
Study areas |
Responsible person |
Hours per week |
Coordinating university |
1,5 ECTS |
M2 - Master's programme 2. year |
Computer Science |
Rudolf Hörmanseder |
1 hpw |
Johannes Kepler University Linz |
|
|
|
Detailed information |
Pre-requisites |
(*)Empfohlen: Vorlesung und Übung Netzwerke und verteilte Systeme (aus dem Bachelor Informatik), Kombinierte Lehrveranstaltung Cryptography
|
Original study plan |
Master's programme Computer Science 2021S |
Objectives |
Students know some of the most used application protocols in TCP/IP networks such as HTTP, SMTP, POP3, IMAP, FTP, TELNET. They are familiar with the structure of these protocols and their use cases as well as their security problems. They know how persons responsible for system administration should act with a view to safety and availability.
|
Subject |
System security, threat scenarios, security goals in networks, repetition of the fundamentals of cryptography (one-way functions, symmetrical encryption, asymmetrical encryption), security mechanisms for networks, remote login (TELNET, RLOGIN), file transfer and access (FTP, TFTP), e-mail (SMTP , POP3, IMAP, MIME), World Wide Web (HTTP and sucessors), directory services (LDAP), file systems (NFS), network management (SNMP), web services (XML, SOAP, WSDL, UDDI), Authentification (OAuth, SASL, Kerberos), TLS.
|
Criteria for evaluation |
Criteria are student cooperation, presentation, a written report, and final discussion.
|
Methods |
Slide presentations with case studies; student projects with presentations and written reports.
|
Language |
German |
Study material |
Basic literature:
- Bless, R. et. al.: Sichere Netzwerkkommunikation. Grundlagen, Protokolle und Architekturen. Springer, Berlin/Heidelberg, 2005.
RFCs of the noted protocols Further literature will be announced in the lecture.
|
Changing subject? |
No |
Further information |
https://www.jku.at/en/institute-of-networks-and-security/
|
|
|
|
On-site course |
Maximum number of participants |
- |
Assignment procedure |
Direct assignment |
|
|
|