Enterprise and IT Security

Der fortgeschrittene Master-Studiengang Enterprise and IT Security (ENITS) öffnet Türen und hilft auf dem Weg zur Führungsposition im Bereich IT-Sicherheit.

Modulhandbuch

 Zurück 

Mobile Security

Prerequisite
  • Computer Networks (Computernetze)
  • Network Security (Netzwerksicherheit)
  • applied cryptanalysis
Teaching methods Lecture/Lab
Learning target / Competences

After successful participation in the course students shall be able to:

  • understand and assess basic mobile and wireless security aspects
  • understand selected security protocols and connection to infrastructure services of wireless networks as well as assess the security level provided
  • understand selected system security aspects, and vulnerability of mobile devices as well as assess the security level provided
Duration 1
SWS 4.0
Overview
Classes 60
Individual / Group work: 120
Workload 180
ECTS 6.0
Credits and grades

written exam, 90 min. (K90, Mobile Security) and report (BE, Lab Mobile Security)

Responsible person

Prof. Dr. Dirk Westhoff

Recommended semester 2
Frequency Every 2nd sem.
Usability

A comprehensive understanding of IT-security issues concerning mobile devices and wireless networks is in increasing demand by IT-sector employers.

Lectures

Mobile Security

Type Vorlesung
Nr. M+I814
SWS 2.0
Content
  • introduction

    • overview of threats and attack techniques in the context of mobile devices and wireless networks

  • system security of mobile devices

    • Android OS: covert channels over IPC, privilege escalation

    • code obfuscation techniques and reverse engineering methods for android

  • security protocols and wireless networks, such as

    • security considerations of cellular networks (GSM, UMTS), wireless local networks (WLAN 802.1, ZigBee WSN), PANs (Bluetooth), WIDS, DECT and L2 PiP injections (802.15.4)

    • messenger security

  • connection to infrastructure services

    • remote codes attestation

    • robust and secure OTA programming

    • key exchange between low-power (RFD) and high-performance devices (FFD)

    • Internet of Things: secure data monitoring and data storage

Literature
  • selected IEEE & ACM DLs publications
  • Levente Buttyan and Jean-Pierre Hubaux: Security and Cooperation in Wireless Networks, 2007

Labor Mobile Security

Type Labor
Nr. M+I815
SWS 2.0
Content

See M+I814 Mobile Security

Literature

See M+I814 Mobile Security

 Zurück