Enterprise and IT Security (ENITS)

Do you aspire to a leadership position in the field of IT security? The advanced, comprehensive Master’s degree program Enterprise and IT Security (ENITS) of Offenburg University will open the doors for you and help you to achieve your goal.

Modul manual

 Zurück 

Anonymity and Surveillance

Prerequisite

Recommended Knowledge and Courses:

  • Computer Networks (Computernetze)
  • Network Security (Netzwerksicherheit)
  • Applied Cryptanalysis
Teaching methods Lecture/Seminar
Learning target / Competences

After successful participation in the course students shall be able to:

  • have knowledge of basic terms and concepts of anonymity and privacy protection in computer networks
  • describe attacks on anonymous network communication and the exchange of sensitive data and explain defense mechanisms
  • explain selected anonymization technologies (such as anonymizers, digital mixers, remailer systems and TOR) and their functionality as well as OTR technologies
Duration 1
SWS 4.0
Overview
Classes 60
Individual / Group work: 120
Workload 180
ECTS 6.0
Credits and grades

written exam, 90 min. (K90, Anonymity and Surveillance) and oral presentation (RE, Seminar Anonymity and Surveillance)

Responsible person

Prof. Dr. Daniel Hammer

Recommended semester 1
Frequency Every 2nd sem.
Usability

A comprehensive understanding of the basic technologies of protection against surveillance and (industrial) espionage and anonymous communication in computer networks is in increasing demand by IT-sector employers.

Lectures

Anonymity and Surveillance

Type Vorlesung
Nr. M+I807
SWS 3.0
Content
  • communication in networks when internal and external attackers are present
  • definition and usage of the terms anonymity, non-linkability and unobservability
  • concepts of distinguishability, concatenation and pseudonymity
  • privacy with different protection levels of communication data
  • legal framework of anonymity and data protection in the Internet
  • anonymization technologies, overlay networks
  • anonymizer, digital mixing according to Chaum, Java Anon Proxy (JAP) / JonDo
  • TOR networks and hidden services
  • threat models, mechanisms for protecting private network communication
  • self-protection in social networks, Deep Web und crime
  • remailer-systems and OTR-technologies
  • techniques for identifying users on the web
  • impact of anonymous Internet usage
Literature
  • selected publications of IEEE & ACM DLs
  • Jens Kubieziel, Anonym im Netz – Wie Sie sich und Ihre Daten schützen. Open Source Press; 3. Auflage, 2012.
  • Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier and Srinivas Devadas, Circuit fingerprinting attacks: Passive deanonymization of tor hidden services. In Proceedings of the 24th USENIX Security Symposium, 2015.

Seminar Anonymity and Surveillance

Type Seminar
Nr. M+I808
SWS 1.0
Content

See VL M+I807 Anonymity and Surveillance

Literature

See VL M+I807 Anonymity and Surveillance

 Zurück