[ INMAWKVSAPP ] KV Security in Application Protocols

(*) Unfortunately this information is not available in english.
Workload Education level Study areas Responsible person Hours per week Coordinating university
1,5 ECTS M2 - Master's programme 2. year Computer Science Peter Rene Dietmüller 1 hpw Johannes Kepler University Linz
Detailed information
Pre-requisites (*)Empfohlen: Vorlesung und Übung Netzwerke und verteilte Systeme (aus dem Bachelor Informatik), Kombinierte Lehrveranstaltung Cryptography
Original study plan Master's programme Computer Science 2016W
Objectives Students know how persons responsible for system administration should act with a view to safety and availability. They get an overview of Internet application protocols such as HTTP, SMTP, POP3, IMAP, FTP, TELNET. They get familiar with the structure of these protocols and their possible uses as well as their security problems.
Subject System security, attack scenarios, security goals in networks, recapitulation of basics in cryptography, security mechanisms for networks, remote login, file transfer, email, WWW, directory services, network management, web services.
Criteria for evaluation Criteria are student cooperation (25%), presentation (25%), written report (%25), final discussion (25%).
Methods Slide presentations with case studies; student projects with presentations and written reports.
Language German
Study material Basic literaturs: Bless, R. et. al.: Sichere Netzwerkkommunikation. Grundlagen, Protokolle und Architekturen. Springer, Berlin/Heidelberg, 2005.

Further literature will be announced in the lecture.

Changing subject? No
Further information
On-site course
Maximum number of participants -
Assignment procedure Direct assignment