Enterprise and IT Security (ENITS)

Do you aspire to a leadership position in the field of IT security? The advanced, comprehensive Master’s degree program Enterprise and IT Security (ENITS) of Offenburg University will open the doors for you and help you to achieve your goal.

Modul manual

 Zurück 

Security in Ubiquitous Computing

Prerequisite
  • Computer Networks (Computernetze)
  • Network Security (Netzwerksicherheit)
  • Cryptography
  • Application Security (Applikationssicherheit)
Teaching methods Lecture/Lab
Learning target / Competences

In this lecture series we will look at different aspects of „ubiquitous“ security, i.e.
security concerns and solutions in our daily life as consumers, application developers or software
architects interacting with distributed systems and across different layers in a system stack.
We will start with selected topics in the lifecycle of a mobile or IoT device, covering readily available
security technologies as well as emerging R&D. We will realize that an important aspect is to identify
what can be assumed to be available as a trusted computing base, i.e. the set of all hardware,
firmware, and/or software components that are critical to the security of a computing device. For that
reason, we will investigate trusted execution environments (TEEs) trusted platform modules (TPM)
as well as the currently emerging software guard extensions (SGX).
We will address different security concerns in cloud computing and cloud infrastructures, for example
looking at identity management in distributed systems as well as selected emerging topics when
interacting with encrypted cloud databases.
As part of this lecture series we will also touch on blockchain technology as well as security in
industrial control systems.

Duration 1
SWS 4.0
Overview
Classes 60
Individual / Group work: 120
Workload 180
ECTS 6.0
Credits and grades

written exam, 90 min. (K90, Security in Ubiquitous Computing) and report (BE, Lab Security in Ubiquitous Computing)

Responsible person

Prof. Dr. Dirk Westhoff

Recommended semester 2
Frequency Every 2nd sem.
Lectures

Security in Ubiquitous Computing

Type Vorlesung
Nr. M+I816
SWS 2.0
Content

In this lecture series we will look at different aspects of „ubiquitous“ security, i.e.
security concerns and solutions in our daily life as consumers, application developers or software
architects interacting with distributed systems and across different layers in a system stack.
We will start with selected topics in the lifecycle of a mobile or IoT device, covering readily available
security technologies as well as emerging R&D. We will realize that an important aspect is to identify
what can be assumed to be available as a trusted computing base, i.e. the set of all hardware,
firmware, and/or software components that are critical to the security of a computing device. For that
reason, we will investigate trusted execution environments (TEEs) trusted platform modules (TPM)
as well as the currently emerging software guard extensions (SGX).
We will address different security concerns in cloud computing and cloud infrastructures, for example
looking at identity management in distributed systems as well as selected emerging topics when
interacting with encrypted cloud databases.
As part of this lecture series we will also touch on blockchain technology as well as security in
industrial control systems.

Literature

Pfleeger, C. et al.: “Security in Computing“, 5th Edition, Prentice Hall, 2015
Russell, B., van Duren, D.:“ Practical Internet of Things Security“, 2016, Packt Publishing
Will, A. and Challener, D.: „A Practical Guide to TPM 2.0 Using the Trusted Platform Module in the New Age of Security“, Apress, 2015
Ginter, A.: „SCADA Security: Security: What's Broken and How To Fix It“, Abterra Technologies,2016


https://www.owasp.org/index.php/Application_Threat_Modeling
https://software.intel.com/en-us/articles/intel-software-guard-extensions-tutorial-part-1-foundation

Labor Security in Ubiquitous Computing

Type Labor
Nr. M+I817
SWS 2.0
 Zurück