Vorlesungsskript Introduction into Cyber Security

Chapter 1

Section 1 (18.10.2017) - actualized

  • 1. Why is Cyber Security so Important ?
  • 1.1 Vulnerability of Cyber Systems
  • 1.2 Critical Infrastructures (CRITIS)

Chapter 2

Section 1 (24.10.2017) - actualized

  • 2. Some Cyber Security Basics
  • 2.1 Safety versus Security
  • 2.2 Data Security versus Data Privacy
  • 2.3 Threats
  • 2.4 Security Goals
  • 2.5 (In)security in the Internet

Chapter 3

Section 1 (24.10.2017) - actualized

  • 3. Malware
  • 3.1 Computer Viruses
  • 3.2 Worms

Section 2 (30.10.2017) - actualized

  • 3.3 Trojan Horses (Trojans)
  • 3.4 Rootkits
  • 3.5 Ramsonware
  • 3.6 Scareware
  • 3.7 Further Variants
  • 3.8 Statistics

Chapter 4

Section 1 (02.11.2017) - actualized

  • 4. Attacks
  • 4.1 Techniques of the Attackers

Section 2 (07.11.2017) - actualized

  • 4.1 Techniques of the Attackers (continuation)

Chapter 5

Section 1 (09.11.2017) - actualized

  • 5. Measures for Attack Defense – Methods and Strategies
  • 5.1 Measures for Attack Defense
  • 5.2 IT Security Strategies
  • 5.3 IT-Security Evaluation

Chapter 6

Section 1 (16.11.2017) - actualized

  • 6. Encryption of Data
  • 6.1 Cryptology
  • 6.2 One Time Pad

Section 2 (16.11.2017) - actualized

  • 6.3 Encryption Methods

Section 3 (21.11.2017) - actualized

    • 6.3 Encryption Methods (continuation)

    Section 4 (28.11.2017) - actualized

    • 6.4 Asymmetric Encryption

    Section 5 (29.11.2017) - actualized

    • 6.4 Asymmetric Encryption (continuation)

    Section 5, upright (23.11.2017)

    Section 6 (30.11.2017)

    • 6.4 Asymmetric Encryption (continuation)

    Chapter 7

    Section 1 (06.12.2017) - actualized

    • 7. Authentication
    • 7.1 Object Authentication

    Section 1, upright (30.11.2017)

    Section 2 (07.12.2017) - actualized

    • 7.2 Insertion: Cryptographic Protocols
    • 7.3 Subject Authentication

    Section 3 (07.12.2017) - actualized

    • 7.3 Subject Authentication (continuation)

    Chapter 8

    Section 1 (22.01.2018) - actualized

    • 8. Digital Signatures
    • 8.1 Handwritten vs. Digital Signatures
    • 8.2 Signing with Asymmetric Encryption
    • 8.3 Signing Cryptographic Hash Values

    Chapter 9

    Section 1 (09.01.2018) - actualized

    • 9. Secure Network Communication
    • 9.1 Insertion:Virtual Private Networks
    • 9.2 IPsec (RFC 2401, 4302+3, 4306)

    Section 2 (17.01.2018) - actualized

    • 9.3 TLS/SSL (Transport Layer Security/Secure Sockets Layer) (RFC 2246)
    • 9.4 SSH (Secure Shell) (RFC 4250-56) (https://www.ssh.com/)

    Section 3 (18.01.2018) - actualized

    • 9.5 eMail Security
    • 9.6 IEEE 802.11i Wireless LAN Security
    • 9.7 Integration of Encryption Methods into Communication Hierarchies

    Chapter 10

    Section 1 (23.01.2018)

    • 10. Authorization – Access Rights
    • 10.1 Subjects, Objects, and Access Rights
    • 10.2 Access Control Strategies

    Chapter 11

    Section 1 (25.01.2018)

    • 11. Firewalls
    • 11.1 Tasks and Principle of the Firewall
    • 11.2 Realization Forms of Firewalls
    • 11.3 Firewall Architectures
    • 11.4 Firewall Policies
    • 11.5 Add on: Web Firewalls
    • 11.6 Add on: Hole Punching (RFC 2663)

    Chapter 12

    Section 1 (30.01.2018)

    • 12. Intrusion Detection
    • 12.1 Purpose of Intrusion Detection
    • 12.2 How does an Intrusion Detection System work ?
    • 12.3 Problems and Prospect of Intrusion Detection Systems

    Chapter 13

    Section 1 (30.01.2018)

    • 13. Honeypots

    Chapter 14

    Section 1 (23.04.2018) - actualized

    • 14. Privacy
    • 14.1 Some Fundamental Terms
    • 14.2 Anonymity Measures

    Chapter 15

    Section 1 (19.04.2018) - actualized

    • 15. Anonymity in the Internet
    • 15.1 Mixes
    • 15.2 Mix Cascades
    • 15.3 Onion Routing / Tor

    Chapter 16

    Section 1 (24.04.2018) - actualized

    • 16. Identity Management
    • 16.1 Open ID
    • 16.2 OAuth
    • 16.3 OpenID Connect

    Chapter 17

    Section 1 (08.05.2018)

    • 17. Anonymous Payment
    • 17.1 Blind Signature
    • 17.2 Principle of Electronic Money
    • 17.3 Anonymous Payment in Practice

    Chapter 18

    Section 1 (17.05.2018) - actualized

    • 18. Privacy in the Internet
    • 18.1 Privacy in the World Wide Web
    • 18.2 Privacy in Instant Messaging

    Chapter 19

    Section 1 (29.05.2018)

    • 19. Electronic Identity Documents
    • 19.1 Electronic Passport
    • 19.2 Electronic Identity Card