IT & Mobile Security

Mobile Network Security

Integrated course, 5.00 ECTS

 

Course content

This course expands the basic knowledge of network security to get an insight into security for mobile devices and mobile infrastructures. The main topics of the course are Wireless LAN, WiMax, Bluetooth, NFC, etc. After an introduction to mobile networks such as GSM, UMTS, LTE follows SSL, SSH and VPN-technologies as the basis for a secure connection within distributed networks.  The topic VPN includes the basics, authentication and the implementation in the OSI layers 2, 3, and 4. In addition, the course discusses core topics such as IPSec, "KeyManagement", opportunistic encryption, performance, availability, DDOS-solution, " network monitoring ", NIDS, algorithms for pattern recognition, "honeypots/ -nets" as well as "Intrusion Prevention and Detection Systems". An outlook on "Next Generation Networks" like Sensornets and "Smart Grids" etc. concludes the course at hand.

Learning outcomes

The graduate designs, plans and diagnoses computer networks with a focus on mobile infrastructures and database systems and masters the necessary cryptographic applications.

Recommended or required reading and other learning resources / tools

Books
Schneier: Applied Cryptography,
Ferguson, Schneier: Practical Cryptography,
Natan R. Database Security,
Ambler S. Database Refactoring,
"Security and Privacy in Mobile Information and Communication Systems", Andreas U. Schmidt(Hg), 2012, ISBN-13: 978-3642333910
"Mobile Security", Steven Furnell, 2009, ISBN-13: 978-1849280204
"Wireless and Mobile Networks Security (Iste)", H. Chaouchi, ISBN-13: 978-1848211179
"Mobile and Wireless Network Security and Privacy", S. Kami Makki (Hg), 2007, ISBN-13: 978-0387710570
"Mobile and Wireless Networks Security: Proceedings of the MWNS 2008 Workshop", Maryline Laurent-Maknavickius (hg). 2008, ISBN-13: 978-9812833259
"Advanced IPSec VPN Design (Networking Technology)", Vijay Bollapragada, 2005, ISBN-13: 978-1587051111
"Telecommunication System Engineering", Roger L. Freeman, ISBN-13: 978-0471029557
Sammes: Forensic Computing
Anderson: Security Engineering
Bollapragada: IPSec VPN Design
Garfinkel: Practical Unix and Internet Security Freeman: Telecommunication System Engineering
Journals: -

Mode of delivery

2 ECTS lecture, 3 ECTS tutorial

Prerequisites and co-requisites

modules ISC 1 and CRY

Assessment methods and criteria

Lecture: Final Exam, Tutorial: Continuous Assessment