Lecture: Network Security

The lecture introduces threats on and attaches against computer networks and possible countermeasures cryptographic methods and protocols for securing networks.

Course:

Exercises:

Other:

  • Term: Diploma (Graduate)
  • Requirements: Content of "Data Communication and Internet Technology" is prerequisite.
  • Faculty: old DPO: B,C; new DPO: B
  • Effort: 2L + 1E (4CP)
  • Follow-up/Side-events: A seminar will take place at the end of the lecture period. Subsequent to lectures "Data Communication and Internet Technology" and "Network Security" participating in a lab is possible.

Mailing List - "Network-Security"

The mailing list "Network-Security" is used for news concerning the lecture "Network Security". An additional purpose is to discuss problems, e.g. with viewing or printing slides or assignment sheets. More information on subscribing the mailing list can be found here.

Slides and Presentations

Access to the files requires a username and password. Both will be announced in the first lecture.

ChapterPDF-Files
0. Important information about this lecture Slides 1-29
1. Introduction Slides 1-35
2. Internet Worms Slides 1-42
2.b Botnets Slides 1-12
Worm ChallengeSlides 1-7
3. Attack Vectors
Slides 1-59
4. Firewalls Slides 1-37
5. Network Infrastructure
Slides 1-43
6. Cryptography
Slides 1-62
7. IPsec and TLS
Slides 1-60
8. Authentication
Slides 1-62
9. Intrusion Detection & Response
Slides 1-40
Fighting Cybercrime Slides 1-24

  

Assignment Sheets

The PDF-Files can be viewed and printed with Acrobat Reader. The program is undefinedavailable for free and installed on nearly all hosts of the institute.

Information on Tutorials/Exercises

PDF-file Supplementary Slides Further Information
sheet1
sheet2
sheet3
sheet4
sheet5 Vaudenay attack
sheet6 Files
sheet7