{"id":941,"date":"2025-02-11T09:05:46","date_gmt":"2025-02-11T08:05:46","guid":{"rendered":"https:\/\/www.hsu-hh.de\/dataeng\/?page_id=941"},"modified":"2025-02-11T14:07:42","modified_gmt":"2025-02-11T13:07:42","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/www.hsu-hh.de\/dataeng\/en\/lectures\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Responsible for the module<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/www.hsu-hh.de\/dataeng\/en\/team\/maria-maleshkova\/\" data-type=\"page\" data-id=\"327\"><abbr title=\"Professor\">Prof.<\/abbr> <abbr title=\"Doktor\">Dr.<\/abbr> Maria Maleshkova<\/a>, <a href=\"https:\/\/www.hsu-hh.de\/dataeng\/en\/team\/florian-grensing\/\"><abbr title=\"Master of Science\">M.Sc.<\/abbr> Florian Grensing<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Qualification goal<\/strong><\/h2>\n\n\n\n<p>The module teaches basic skills in the area of security of information technology systems. After successfully completing the module, graduates will be able to<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>assess and evaluate security-relevant aspects of operating systems and computer networks<\/li>\n\n\n\n<li>evaluate and use cryptographic methods<\/li>\n\n\n\n<li>evaluate local and distributed systems with regard to potential risk elements in the structure, organization, and process<\/li>\n\n\n\n<li>harden local and distributed systems with regard to potential risk elements in the structure, organization, and process<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contents<\/strong><\/h2>\n\n\n\n<p>The subject-specific professional qualification and key skills are to be taught in the following areas in particular:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cryptography\n<ul class=\"wp-block-list\">\n<li>Structural basics<\/li>\n\n\n\n<li>Mathematical basics<\/li>\n\n\n\n<li>Encryption methods<\/li>\n\n\n\n<li>Signature methods<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Fundamentals of attack techniques on information technology systems<\/li>\n\n\n\n<li>Fundamentals of automated attack detection (e.g., intrusion detection)<\/li>\n\n\n\n<li>Fundamentals of the protection of information technology systems by\n<ul class=\"wp-block-list\">\n<li>Hardware<\/li>\n\n\n\n<li>Software<\/li>\n\n\n\n<li>Organizational measures<\/li>\n\n\n\n<li>Structural measures<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Aspects of military <abbr title=\"Informationstechnologie\">IT<\/abbr> security<\/li>\n\n\n\n<li>Security-related assessment and hardening of local and distributed systems using case studies<\/li>\n\n\n\n<li><abbr title=\"Informationstechnologie\">IT<\/abbr> security of embedded systems<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Module components<\/strong><\/h2>\n\n\n\n<p>The scope of this course is 2 TWS lecture, 2 TWS exercise for <strong>4 CP<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Recommended literature<\/strong><\/h2>\n\n\n\n<p>Gupta: Computer and Cyber Security: Principles, Algortihm, Applications, and Perspectives<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Responsible for the module Prof. Dr. Maria Maleshkova, M.Sc. Florian Grensing Qualification goal The module teaches basic skills in the area of security of information technology systems. After successfully completing [&hellip;]<\/p>\n","protected":false},"author":4068,"featured_media":0,"parent":118,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-941","page","type-page","status-publish","hentry","category-research"],"_links":{"self":[{"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/pages\/941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/users\/4068"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/comments?post=941"}],"version-history":[{"count":8,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/pages\/941\/revisions"}],"predecessor-version":[{"id":997,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/pages\/941\/revisions\/997"}],"up":[{"embeddable":true,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/pages\/118"}],"wp:attachment":[{"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/media?parent=941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/categories?post=941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/tags?post=941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}