Hasso-Plattner-Institut Design IT. Create Knowledge.

News

01.08.2016

openHPI Course "Internetworking 2016"

A new openHPI course about "Internetworking" starts on September 5, 2016. The course is held by Prof. Dr. Christoph Meinel ... [more]
19.05.2016

openHPI Workshop "Embedded Smart Home"

We are going to offer a new openHPI workshop "Embedded Smart Home" in German language. More Infocan be found here ... [more]
10.03.2016

New public demo

You can check out our public demo platform at https://tele-task-demo.hpi.uni-potsdam.de. Please let us know what you ...

Statistics

userclicks 35 M
lecture 5729
activelecturer 2371
series 473
Lecture-Feed of Series: Internet Security - Weaknesses and Targets (WS 2010/11) Feed of Series: Internet Security - Weaknesses and Targets (WS 2010/11)

Internet Security - Weaknesses and Targets (WS 2010/11)

Prof. Dr. Christoph Meinel

Successor of this series: Internet Security - Weaknesses and Targets (WS 2011/12)

Predecessor of this series: Internet Security - Weaknesses and Targets (WS 2009/10)

"Internet Security - Weaknesses and Targets" is based on "Internet- & WWW-Technologies" and gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion about the possibilities to detect attacks and intrusions and also describes ethical issuses.

Introduction

Not enough ratings.
Date: 20.10.2010
Lang.: en
Dur.: 01:30:00
Play full lecture
• Nowaday's Internet 00:18:29
• Internet is an easy Target 00:17:51
• Evolution of Internet Security 00:18:05
• Most Common Attacks 00:13:47
• Basic Risks by Using the Internet 00:11:42
• Course Content 00:05:40
Not enough ratings.
Date: 21.10.2010
Lang.: en
Dur.: 01:26:28
Play full lecture
• Introduction 00:11:50
• Classification of Computer Networks 00:11:31
• Internets and Internet Protocols 00:20:06
• TCP/IP Protocol Stack 00:14:04
• WWW - World Wide Web 00:12:40
• WWW-Browser and WWW-Server 00:12:28
• Internet Standards 00:03:49

Risk Analysis and Computer Crime

Not enough ratings.
Date: 27.10.2010
Lang.: en
Dur.: 01:12:22
Play full lecture
• Introduction 00:15:05
• Risk Definition 00:13:22
• Evaluation of Risks 00:25:21
• Basic Risks of Internet 00:18:34
Not enough ratings.
Date: 10.11.2010
Lang.: en
Dur.: 00:22:18
Play full lecture
• Introduction 00:00:39
• Potential Attackers 00:14:18
• Professional Hackers 00:07:21
Not enough ratings.
Date: 10.11.2010
Lang.: en
Dur.: 00:52:51
Play full lecture
• First Generation of Hackers 00:10:48
• Viruses, Worms, Trojan Horses 00:11:26
• Short History of Cyber Crime 00:12:29
• Cyber Crime in this century 00:14:52
• Financial Losses by Cyber Crime 00:03:16

Weaknesses and Targets

Not enough ratings.
Date: 17.11.2010
Lang.: en
Dur.: 00:42:06
Play full lecture
• Technical Failures 00:08:32
• Defective Designs 00:06:55
• Lack of Knowledge and Carelessness 00:07:13
• Social Hacking 00:11:25
• Most Typical Break-in Methods 00:08:01
Not enough ratings.
Date: 17.11.2010
Lang.: en
Dur.: 00:37:31
Play full lecture
• Introduction 00:06:22
• Passive Recon 00:12:33
• Web Recon 00:13:20
• Active Recon 00:05:16
Not enough ratings.
Date: 24.11.2010
Lang.: en
Dur.: 00:32:38
Play full lecture
• Introduction 00:03:08
• Telnet Session Negotiation 00:05:44
• TCP Stack Fingerprinting 00:10:22
• Passive Fingerprinting 00:04:25
• Fuzzy OS Fingerprinting 00:08:59
Not enough ratings.
Date: 24.11.2010
Lang.: en
Dur.: 00:56:29
Play full lecture
• Introduction 00:05:04
• Guessing 00:07:43
• Cracking 00:12:53
• Cracking with Rainbow Tables 00:16:42
• Sniffing 00:08:46
• Protection against Password Theft 00:05:21
Not enough ratings.
Date: 01.12.2010
Lang.: en
Dur.: 01:30:00
Play full lecture
• Introduction 00:15:24
• IP Address Spoofing 00:07:18
• ICMP-Attacks 00:26:20
• Internet-Routung-Attacks 00:13:52
• ARP-Attacks 00:15:44
• IP-Fragmentation Attacks 00:09:25
• IP-Bombing 00:05:51
Not enough ratings.
Date: 08.12.2010
Lang.: en
Dur.: 01:35:59
Play full lecture
• Introduction 00:10:26
• Attack Scenarios 00:12:39
• TCP-Sequence-Number Attack 00:25:10
• UDP Attacks 00:17:14
• DNS-Attacks 00:19:13
• Attacks on VoIP 00:11:17
Not enough ratings.
Date: 15.12.2010
Lang.: en
Dur.: 00:30:00
Play full lecture
• Buffer Overflow 00:15:47
• Defective Syntax Check 00:07:05
• Race Conditions 00:07:08
Not enough ratings.
Date: 15.12.2010
Lang.: en
Dur.: 01:21:58
Play full lecture
• Security Architecture of Unix 00:11:17
• Attacks at Boot-Time 00:08:06
• SUID Abuse 00:09:07
• Network and Application Attacks in Unix 00:22:04
• DNS / BIND Vulnerabiliies 00:07:21
• Strategies to protect Unix-Systems 00:24:03
Not enough ratings.
Date: 05.01.2011
Lang.: en
Dur.: 01:15:58
Play full lecture
• Introduction 00:08:05
• SMB Relay Attack 00:09:49
• UPnP Attacks 00:09:50
• Remote Desktop Attacks 00:10:16
• Kerberos Authentication Attacks 00:23:01
• Defeading Buffer Overflow Prevention 00:05:30
• Weaknesses of Mac OS X 00:09:27
Not enough ratings.
Date: 12.01.2011
Lang.: en
Dur.: 01:07:59
Play full lecture
• Introduction 00:08:25
• Spying Out Personal Data 00:15:51
• Java 00:21:19
• JavaScript 00:16:47
• Protective Measures for Web-Browsers 00:05:37
Not enough ratings.
Date: 19.01.2011
Lang.: en
Dur.: 01:08:05
Play full lecture
• Introduction 00:06:01
• Break into Web-Servers 00:23:13
• Cross-Site-Scripting 00:18:09
• Current Challenges in SOA-Security 00:08:50
• WS-Security 00:11:52
Not enough ratings.
Date: 26.01.2011
Lang.: en
Dur.: 01:26:33
Play full lecture
• Introduction 00:03:59
• IEEE 802.11 Wireless Lan 00:21:15
• WLAN Security Weaknesses 00:12:44
• WLAN Security with IEEE 802.1x 00:09:29
• WLAN Security with WPA 00:12:33
• WLAN Security in Practice 00:07:28
• Cellular Phone Technologies 00:19:05

Detection of Attacks and Intrusions

Not enough ratings.
Date: 02.02.2011
Lang.: en
Dur.: 01:23:25
Play full lecture
• Introduction 00:11:18
• Anomalies and Attack Signatures 00:14:42
• Attack Signatures 00:08:41
• Anti-Virus Software 00:14:29
• Implementation of IDS 00:13:10
• Alert Corelation 00:21:05

Legal and Ethical Issues

Not enough ratings.
Date: 09.02.2011
Lang.: en
Dur.: 01:19:52
Play full lecture
• Introduction 00:06:06
• Legal Systems 00:08:10
• Example German Criminal Law 00:13:06
• Case Studies 00:17:12
• Responsibility of IT-Managers 00:23:05
• Code of Ethics 00:12:13
Tags added to this content

Internet (1); Sicherheit (1);

Tag this content

Please enable javascript to use this function.

Dear user,
with the tagging function you'll be able to add taggs to videos.
However, in order to link all your tags with your user profile it is required that you
login to the tele-TASK portal to use this functionality.
If you don't have an account yet, you may register for a tele-TASK account here.
Links added to this content
Add Link to this content

Please enable javascript to use this function.

Dear user,
with the links function you'll be able to add links to other resources to this content.
However, in order to link all your links with your user profile it is required that you
login to the tele-TASK portal to use this functionality.
If you don't have an account yet, you may register for a tele-TASK account here.