Modul | Network Security (IN2101) | Course | Network Security (Netzsicherheit) | Lecturers | Prof. Dr.-Ing. Georg Carle, Dr. Heiko Niedermayer, Ralph Holz | SWS | 4 (3+1) | ECTS Credits | 5.0 | Language | English | Dates | Wednesdays, 10:15-11:45 h in Interims-HS 2 Wednesday, 12:25-13:55 h in Interims-HS 2
Exercises will take place at certain time slots of the lectures; these will be announced during the course. | | | Contents | This lecture is an introduction to the field of network security and its fundamental topics like cryptographic operations, threats, and security goals. This is used further as a starting point and requirements for the design of secure networks are discuessed. Modern security protocols in modern network protocols and architectures are presented as well as vulnerabilities in existing systems. |
---|
Reader | tbd | Registration | For the course: TUMOnline. For the exercises: to be announced! | | | Exams | Written exam: Saturday Feb 22nd 2014 at 8:30 in MW 2001, Rudolf-Diesel-Hörsaal. Repeat exam: April 2nd 2014 at 15:30 in Interims-HS 1
IMPORTANT: The exam is closed-book. All you need, and will be allowed to use, is a pen (not a pencil). In particular, material from the lecture (slide deck, material from tutorial/exercises) is not allowed.
| Assignments | The purpose of the assignments is to help you deepen your understanding of the subject and get your questions answered. In our experience, students who have done the assignments do also better in the exam later. We thus strongly recommend doing the assignments and also to attend the tutorial hours.
Some assignments will require a Linux environment for programming. We recommend you download our Virtual Machine, a Ubuntu 12.04 LTS. Instructions are in the zip file.
Example solutions to the assignments will be provided during tutorial hours.
Always watch this space for updates to assignment (in case flaws are found).
Submission: By SVN. Instructions on first assignment.
Assignment | Version | Sample solution | Remarks |
---|
Introduction to assignments and plagiarism statement | 1.1 | N/A | Describes assignments and states our anti-plagiarism policy | Assignment 1 | 1.1 |
| code skeleton here v1.1: Fixed URL to SVN repository. | Assignment 2 | 1.0 | | Skeleton code | Assignment 3 | 1.2 | | keyutils.py, certs.zip | Assignment 4 | 1.0 | | |
| Slides | Download the slides as PDF. Current slides will be published in time before presentation. Updates may occur, please check for changes.
Chapter | Version | 1 up | 1. Introduction | 16/10/2013 | PDF | 2.1 Symmetric Cryptography | 16/10/2013 | PDF | 2.2 Cryptographic Hash Functions | 22/10/2013 | PDF | 2.3 Secure Channel and Authenticated Encryption | 28/10/2013 | PDF | 2.4 Public Key Cryptography | 13/1/2014 (typo on slide 13) | PDF | 2.5 Random Number Generators | 28/10/2013 | PDF | 2.6 Cryptographic Protocols | 11/11/2013 | PDF | 3 Kerberos | 25/11/2013 | PDF | 4 X.509 PKI | 03/12/2013 | PDF | 5 n/a | | | 6 IPSec | 4/12/2013 | PDF | 7 Transport Layer Security | 17/12/2013 | PDF | 8 Link Layer Security | 14/01/2014 | PDF | 9 Security Policies and Firewalls | 08/01/2014 v.1.1 | PDF | 10 Denial of Service Attacks | 14/01/2014 | PDF | 11 Attack and Intrusion Detection | 14/01/2014 | PDF | 12 WWW Security | 14/01/2014 | PDF | | | | | | | | | |
---|
|
|