Hasso-Plattner-Institut Design IT. Create Knowledge.

News

01.08.2016

openHPI Course "Internetworking 2016"

A new openHPI course about "Internetworking" starts on September 5, 2016. The course is held by Prof. Dr. Christoph Meinel ... [more]
19.05.2016

openHPI Workshop "Embedded Smart Home"

We are going to offer a new openHPI workshop "Embedded Smart Home" in German language. More Infocan be found here ... [more]
10.03.2016

New public demo

You can check out our public demo platform at https://tele-task-demo.hpi.uni-potsdam.de. Please let us know what you ...

Statistics

userclicks 35 M
lecture 5732
activelecturer 2373
series 472
Lecture-Feed of Series: Internet Weaknesses and Targets (WT 2008/09) Feed of Series: Internet Weaknesses and Targets (WT 2008/09)

Internet Weaknesses and Targets (WT 2008/09)

Image of
Not enough ratings.

Prof. Dr. Christoph Meinel

Successor of this series: Internet Security - Weaknesses and Targets (WS 2009/10)

Predecessor of this series: Internet Security - Weaknesses and Targets (WT 2007/08)

"Internet Security - Weaknesses and Targets" is based on "Internet- & WWW-Technologies" and gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion about the possibilities to detect attacks and intrusions and also describes ethical issuses.

Introduction

Not enough ratings.
Date: 22.10.2008
Lang.: en
Dur.: 01:26:24
Play full lecture
• Nowaday's Internet 00:13:37
• Risks when using Internet-based Info-Systems 00:04:38
• Systematic Problem in Internet Security 00:05:48
• Internet is an easy Target 00:13:45
• Improved Opportunities for Intrusion 00:05:54
• Direction of Internet Security 00:03:58
• Complexity of Internet 00:06:36
• Cyber Crimes and Damage 00:12:02
• General Risks of Interconnected IT-Systems 00:06:16
• Basic Risks by using Internet 00:08:22
• Course Content 00:05:28
Not enough ratings.
Date: 22.10.2008
Lang.: en
Dur.: 01:19:26
Play full lecture
• Introduction 00:03:26
• Computer Networks 00:04:32
• Internets and Internet Protocols 00:25:27
• Internet Services and Applications 00:04:42
• WWW 00:15:14
• WWW - Browser and WWW-Server 00:08:06
• History of Internet and WWW 00:09:38
• Who-is-Who 00:04:32
• Internet Standards 00:03:49

Risk Analysis and Cyber Crime

Not enough ratings.
Date: 29.10.2008
Lang.: en
Dur.: 01:14:32
Play full lecture
• Introduction 00:06:01
• Risks in Internetworking IT-Systems 00:13:41
• Risk Definition 00:02:07
• Phases of Risk Analysis 00:11:32
• Evaluation of Risks 00:25:04
• Basic Risks of Internet 00:16:07
Not enough ratings.
Date: 05.11.2008
Lang.: en
Dur.: 00:30:07
Play full lecture
• Potential Attackers 00:30:07
Not enough ratings.
Date: 05.11.2008
Lang.: en
Dur.: 00:47:14
Play full lecture
• First Hackers 00:12:37
• Underground Mailboxes 00:02:03
• Viruses, Worms, Trojan Horses 00:11:43
• Short History of Cyber Crime 00:19:27
• Financial Losses by Cyber Crime 00:01:24

Weaknesses and Targets

Not enough ratings.
Date: 12.11.2008
Lang.: en
Dur.: 00:44:25
Play full lecture
• Technical Failure 00:11:02
• Defective Design 00:07:30
• Lack of Knowledge and Carelessness 00:09:29
• Social Hacking 00:04:33
• Defective Organization 00:03:27
• Unprotected Hardware 00:01:44
• Most Typical Break-in Methods 00:06:40
Not enough ratings.
Date: 12.11.2008
Lang.: en
Dur.: 00:30:21
Play full lecture
• Introduction 00:04:50
• Passive Recon 00:09:55
• Web Recon 00:11:01
• Active Recon 00:04:35
Not enough ratings.
Date: 19.11.2008
Lang.: en
Dur.: 00:35:21
Play full lecture
• Introduction 00:02:15
• Telnet Session Negotiation/Banners 00:05:49
• TCP Stack Fingerprinting 00:12:48
• Passive Fingerprinting 00:05:06
• Fuzzy OS Fingerprinting 00:05:35
• TCP/IP Timeout Detection 00:03:48
Not enough ratings.
Date: 19.11.2008
Lang.: en
Dur.: 00:50:42
Play full lecture
• Introduction 00:07:42
• Password Guessing 00:04:54
• Password Cracking 00:23:22
• Password Sniffering 00:02:42
• Password Monitoring 00:01:38
• Phishing - "Password Fishing" 00:05:47
• Protection Aganist Password Theft 00:04:37
Not enough ratings.
Date: 26.11.2008
Lang.: en
Dur.: 01:28:00
Play full lecture
• Introduction 00:13:58
• Attack Scenarios 00:03:42
• IP Address Spoofing 00:06:18
• ICMP Attacks 00:23:53
• Internet-Routing-Attack 00:12:20
• ARP - Attacks 00:07:26
• IP - Fragmentation Attacks 00:11:33
• IP - Bombing 00:08:50
Not enough ratings.
Date: 03.12.2008
Lang.: en
Dur.: 01:19:28
Play full lecture
• Introduction 00:08:42
• Attack Scenarios 00:02:31
• SYN - Flooding 00:08:20
• TCP - Sequence Number Attack 00:16:20
• Cancel/Hijack TCP-Connection 00:07:29
• UDP Attacks 00:02:58
• DNS Attacks 00:07:10
• SMTP Attacks 00:04:37
• Telnet Attacks 00:04:16
• FTP Attacks 00:05:40
• Weaknesses of VoIP Protocol 00:11:25
Not enough ratings.
Date: 10.12.2008
Lang.: en
Dur.: 00:37:12
Play full lecture
• Introduction 00:02:22
• Buffer Overflow 00:19:09
• Defective Syntax Check 00:09:20
• Race Conditions 00:06:21
Not enough ratings.
Date: 17.12.2008
Lang.: en
Dur.: 01:24:46
Play full lecture
• Security Architecture of Unix 00:10:39
• Attacks at Boot-Time 00:02:50
• Password Attacks in Unix 00:07:57
• Abuse of Symbolic Links 00:04:40
• Breaking Out of Runtime Environments 00:03:52
• Network Attacks in Unix 00:25:46
• Stragies to Protect Unix-Systems 00:29:02
Not enough ratings.
Date: 07.01.2009
Lang.: en
Dur.: 01:22:30
Play full lecture
• Introduction 00:07:39
• SMB Relay Attack 00:06:29
• RPC Attack 00:04:53
• UPnP Attack 00:11:36
• Remote Desktop Attacks 00:06:26
• MS Windows Server 00:03:21
• Kerberos Authentication Attacks 00:02:57
• Kerberos Authentication Review 00:07:59
• Cross-Domain Network Resources 00:04:23
• Weakness in Kerberos Protocol 00:07:22
• Defeating Buffer Overflow Prevention 00:05:50
• Mac OS X Weaknesses 00:13:35
Not enough ratings.
Date: 14.01.2009
Lang.: en
Dur.: 01:01:30
Play full lecture
• Introduction 00:03:12
• Target Web-Browser 00:01:19
• Spying Out Personal Data 00:13:24
• Java 00:21:13
• JavaScript 00:13:30
• ActiveX 00:03:28
• Protective Measure for Web-Browsers 00:05:24
Not enough ratings.
Date: 21.01.2009
Lang.: en
Dur.: 01:13:11
Play full lecture
• Introduction 00:04:35
• Break into Web-Servers 00:01:50
• CGI-Attacks 00:04:22
• URL-Attacks 00:05:40
• SQL-Injection 00:11:58
• Cross-Site Scripting 00:12:34
• Current Challenges of SOA Security 00:05:38
• WS-Security 00:12:52
• Current Challenges of Web 2.0 Security 00:13:42
Not enough ratings.
Date: 28.01.2009
Lang.: en
Dur.: 01:23:57
Play full lecture
• Introduction 00:04:46
• IEEE 802.11 Wireless LAN - WLAN 00:17:21
• WLAN Parameters 00:04:08
• WLAN Security Mechanisms 00:07:43
• WLAN Security Weaknesses 00:11:00
• WLAN Security with IEEE 802.1x 00:05:20
• Extended WLAN Security 00:14:32
• WLAN Security in Practice 00:05:21
• Cellular Phone Technologies 00:05:48
• Secure Connections with Mobile Devices 00:02:56
• Weaknesses of GSM Technologies 00:02:05
• Summary 00:02:57

Detection of Attacks and Intrusions

Not enough ratings.
Date: 04.02.2009
Lang.: en
Dur.: 01:08:11
Play full lecture
• Introduction 00:07:57
• Audit Log Reduction 00:02:47
• Anomalies and Attack Signatures 00:01:58
• Anomalies 00:05:20
• Detecting Anomalies 00:11:09
• Attack Signatures 00:06:15
• Implementation of IDS 00:01:48
• Network-based IDS 00:05:24
• Host-based IDS 00:04:54
• Implementation of Intrusion Dection System 00:03:29
• Reactions on Attacks 00:04:59
• Intrusion Response 00:03:47
• Limitations of Intrusion Dection Systems 00:08:24

Legal and Ethical in Internet Security

Not enough ratings.
Date: 11.02.2009
Lang.: en
Dur.: 01:17:37