Vorlesungsskript Introduction into Cyber Security
Chapter 1
Section 1 (18.10.2017) - actualized
- 1. Why is Cyber Security so Important ?
- 1.1 Vulnerability of Cyber Systems
- 1.2 Critical Infrastructures (CRITIS)
Chapter 2
Section 1 (24.10.2017) - actualized
- 2. Some Cyber Security Basics
- 2.1 Safety versus Security
- 2.2 Data Security versus Data Privacy
- 2.3 Threats
- 2.4 Security Goals
- 2.5 (In)security in the Internet
Chapter 3
Section 1 (24.10.2017) - actualized
- 3. Malware
- 3.1 Computer Viruses
- 3.2 Worms
Section 2 (30.10.2017) - actualized
- 3.3 Trojan Horses (Trojans)
- 3.4 Rootkits
- 3.5 Ramsonware
- 3.6 Scareware
- 3.7 Further Variants
- 3.8 Statistics
Chapter 4
Section 1 (02.11.2017) - actualized
- 4. Attacks
- 4.1 Techniques of the Attackers
Section 2 (07.11.2017) - actualized
- 4.1 Techniques of the Attackers (continuation)
Chapter 5
Section 1 (09.11.2017) - actualized
- 5. Measures for Attack Defense – Methods and Strategies
- 5.1 Measures for Attack Defense
- 5.2 IT Security Strategies
- 5.3 IT-Security Evaluation
Chapter 6
Section 1 (16.11.2017) - actualized
- 6. Encryption of Data
- 6.1 Cryptology
- 6.2 One Time Pad
Section 2 (16.11.2017) - actualized
- 6.3 Encryption Methods
Section 3 (21.11.2017) - actualized
- 6.3 Encryption Methods (continuation)
Section 4 (28.11.2017) - actualized
- 6.4 Asymmetric Encryption
Section 5 (29.11.2017) - actualized
- 6.4 Asymmetric Encryption (continuation)
Section 5, upright (23.11.2017)
Section 6 (30.11.2017)
- 6.4 Asymmetric Encryption (continuation)
Chapter 7
Section 1 (06.12.2017) - actualized
- 7. Authentication
- 7.1 Object Authentication
Section 1, upright (30.11.2017)
Section 2 (07.12.2017) - actualized
- 7.2 Insertion: Cryptographic Protocols
- 7.3 Subject Authentication
Section 3 (07.12.2017) - actualized
- 7.3 Subject Authentication (continuation)
Chapter 8
Section 1 (22.01.2018) - actualized
- 8. Digital Signatures
- 8.1 Handwritten vs. Digital Signatures
- 8.2 Signing with Asymmetric Encryption
- 8.3 Signing Cryptographic Hash Values
Chapter 9
Section 1 (09.01.2018) - actualized
- 9. Secure Network Communication
- 9.1 Insertion:Virtual Private Networks
- 9.2 IPsec (RFC 2401, 4302+3, 4306)
Section 2 (17.01.2018) - actualized
- 9.3 TLS/SSL (Transport Layer Security/Secure Sockets Layer) (RFC 2246)
- 9.4 SSH (Secure Shell) (RFC 4250-56) (https://www.ssh.com/)
Section 3 (18.01.2018) - actualized
- 9.5 eMail Security
- 9.6 IEEE 802.11i Wireless LAN Security
- 9.7 Integration of Encryption Methods into Communication Hierarchies
Chapter 10
Section 1 (23.01.2018)
- 10. Authorization – Access Rights
- 10.1 Subjects, Objects, and Access Rights
- 10.2 Access Control Strategies
Chapter 11
Section 1 (25.01.2018)
- 11. Firewalls
- 11.1 Tasks and Principle of the Firewall
- 11.2 Realization Forms of Firewalls
- 11.3 Firewall Architectures
- 11.4 Firewall Policies
- 11.5 Add on: Web Firewalls
- 11.6 Add on: Hole Punching (RFC 2663)
Chapter 12
Section 1 (30.01.2018)
- 12. Intrusion Detection
- 12.1 Purpose of Intrusion Detection
- 12.2 How does an Intrusion Detection System work ?
- 12.3 Problems and Prospect of Intrusion Detection Systems
Chapter 13
Section 1 (30.01.2018)
- 13. Honeypots
Chapter 14
Section 1 (23.04.2018) - actualized
- 14. Privacy
- 14.1 Some Fundamental Terms
- 14.2 Anonymity Measures
Chapter 15
Section 1 (19.04.2018) - actualized
- 15. Anonymity in the Internet
- 15.1 Mixes
- 15.2 Mix Cascades
- 15.3 Onion Routing / Tor
Chapter 16
Section 1 (24.04.2018) - actualized
- 16. Identity Management
- 16.1 Open ID
- 16.2 OAuth
- 16.3 OpenID Connect
Chapter 17
Section 1 (08.05.2018)
- 17. Anonymous Payment
- 17.1 Blind Signature
- 17.2 Principle of Electronic Money
- 17.3 Anonymous Payment in Practice
Chapter 18
Section 1 (17.05.2018) - actualized
- 18. Privacy in the Internet
- 18.1 Privacy in the World Wide Web
- 18.2 Privacy in Instant Messaging
Chapter 19
Section 1 (29.05.2018)
- 19. Electronic Identity Documents
- 19.1 Electronic Passport
- 19.2 Electronic Identity Card