Internet Security - Weaknesses and Targets

Prof. Dr. Christoph Meinel


The lecture course "Internet Security II - Weaknesses and Targets" is based on the lecture course "Internet Security I - Internet Technology" and gives a detailed introduction into problems concerning Internet and Intranet security. After starting with a some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion of possibilities to detect attacks and intrusions, and ethical issuses.

Foreword

Foreword

Date: March 5, 2004
Language: English
Duration: 00:23:32
Foreword
Foreword 00:23:32

Introduction

Introduction

Date: October 31, 2002
Language: English
Duration: 01:26:42
Introduction

Risk Analysis

Date: November 5, 2002
Language: English
Duration: 01:29:21
Risk Analysis

Computer Crime: Criminals and Motives

Date: November 7, 2002
Language: English
Duration: 01:31:59
Computer Crime: Criminals and Motives

Hackers and Viruses

Date: November 12, 2002
Language: English
Duration: 01:01:55
Hackers and Viruses

Weaknesses and Targets

Human Factor and Technical Failures

Date: December 12, 2002
Language: English
Duration: 00:52:05
Human Factor and Technical Failures

Spy Out Network Infrastructure

Date: December 12, 2002
Language: English
Duration: 00:37:38
Spy Out Network Infrastructure

Attacks on Accounts and Passwords

Date: December 17, 2002
Language: English
Duration: 00:47:19
Attacks on Accounts and Passwords

Attacking Internet Protocols (I)

Date: December 17, 2002
Language: English
Duration: 00:38:30
Attacking Internet Protocols (I)

Attacking Internet Protocols (II)

Date: December 19, 2002
Language: English
Duration: 01:18:27
Attacking Internet Protocols (II)

Attacking Internet Protocols (III)

Date: January 7, 2003
Language: English
Duration: 00:34:24
Attacking Internet Protocols (III)

Misuse of Design and Programming Errors

Date: January 7, 2003
Language: English
Duration: 00:36:11
Misuse of Design and Programming Errors

Weaknesses in Unix/Linux (I)

Date: January 9, 2003
Language: English
Duration: 01:27:27
Weaknesses in Unix/Linux (I)

Weaknesses in Unix/Linux (II)

Date: January 14, 2003
Language: English
Duration: 01:10:57
Weaknesses in Unix/Linux (II)

Weaknesses in Windows NT/2000 (I)

Date: January 16, 2002
Language: English
Duration: 01:14:20
Weaknesses in Windows NT/2000 (I)

Weaknesses in Windows NT/2000 (II)

Date: January 21, 2003
Language: English
Duration: 00:49:34
Weaknesses in Windows NT/2000 (II)

Targets in the World Wide Web (I)

Date: January 23, 2003
Language: English
Duration: 01:07:32
Targets in the World Wide Web (I)

Targets in the World Wide Web (II)

Date: January 28, 2003
Language: English
Duration: 00:58:42
Targets in the World Wide Web (II)

Viruses, Worms, Trojan Horses

Date: January 30, 2003
Language: English
Duration: 01:25:04
Viruses, Worms, Trojan Horses