This course given an overview of the different aspects of IT security, ranging from basic requirements and attacker models to protocol, operating system, and code security. After hearing this lectures, students should be able to place the more specific areas (some of which are covered by other courses at JKU) within the broad landscape of IT security.
Threat scenarios, risks, authentification methods, hash functions, formal access models (Discretionary Access, Mandatory Access, Verbandsmodell, Role Based Access Control), basic concepts of cryptography, types of malware. Objectives of IT security, process models.
weekly, Mon. 12:00 – 13:30, HS 19