Learning target / Competences
|
In this lecture series we will look at different aspects of „ubiquitous“ security, i.e. security concerns and solutions in our daily life as consumers, application developers or software architects interacting with distributed systems and across different layers in a system stack. We will start with selected topics in the lifecycle of a mobile or IoT device, covering readily available security technologies as well as emerging R&D. We will realize that an important aspect is to identify what can be assumed to be available as a trusted computing base, i.e. the set of all hardware, firmware, and/or software components that are critical to the security of a computing device. For that reason, we will investigate trusted execution environments (TEEs) trusted platform modules (TPM) as well as the currently emerging software guard extensions (SGX). We will address different security concerns in cloud computing and cloud infrastructures, for example looking at identity management in distributed systems as well as selected emerging topics when interacting with encrypted cloud databases. As part of this lecture series we will also touch on blockchain technology as well as security in industrial control systems.
|