Hasso-Plattner-Institut Design IT. Create Knowledge.

News

11.09.2017

New tele-TASK Web Portal

At beta.tele-task.de you can already the future web portal of tele-TASK before being officially launched. We are thankful ... [more]
10.03.2017

CeBIT 2017

Also this year, tele-TASK and openHPI are at CeBIT (20-24 March, 2017). You can find us at the HPI booth ... [more]
01.08.2016

openHPI Course "Internetworking 2016"

A new openHPI course about "Internetworking" starts on September 5, 2016. The course is held by Prof. Dr. Christoph Meinel ... [more]

Statistics

userclicks 35 M
lecture 6162
activelecturer 2573
series 505
Lecture-Feed of Series: Internet Security - Weaknesses and Targets (WT 2012/13) Feed of Series: Internet Security - Weaknesses and Targets (WT 2012/13)

Internet Security - Weaknesses and Targets (WT 2012/13)

Image of
Not enough ratings.

Prof. Dr. Christoph Meinel

Successor of this series: Internet Security - Weaknesses and Targets (WT 2013/14)

Predecessor of this series: Internet Security - Weaknesses and Targets (WS 2011/12)

"Internet Security - Weaknesses and Targets" is based on "Internet- & WWW-Technologies" and gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion about the possibilities to detect attacks and intrusions and also describes ethical issuses.

Outline

Introduction

Not enough ratings.
Date: 17.10.2012
Lang.: en
Dur.: 01:06:50
Play full lecture
• Table of Content 00:12:45
• Nowadays Internet 00:15:03
• Changing Nature of the Threats 00:18:22
• Most Common Attacks 00:07:32
• General Risks 00:13:04
Not enough ratings.
Date: 17.10.2012
Lang.: en
Dur.: 01:23:38
Play full lecture
• Computer Networks 00:21:41
• Internets and Internet Protocols 00:15:24
• TCP/IP Protocol Stack 00:13:31
• WWW - World Wide Web 00:13:47
• Who-is-Who in Internet and WWW 00:19:15

Risk Analysis and Computer Crime

Not enough ratings.
Date: 19.10.2012
Lang.: en
Dur.: 01:02:21
Play full lecture
• Introduction 00:05:19
• Risks in Internetworking IT-Systems 00:11:14
• Risk Definition and Analysis 00:09:15
• Evaluation of Risks 00:22:17
• Basic Risks of Internet 00:14:16
Not enough ratings.
Date: 19.10.2012
Lang.: en
Dur.: 00:22:38
Play full lecture
• Potential Attackers 00:08:41
• Hackers from High-Schools and Universities 00:06:45
• Professional Hacker Criminals 00:07:12
Not enough ratings.
Date: 14.11.2012
Lang.: en
Dur.: 01:08:12
Play full lecture
• First Generation of Hackers 00:12:29
• Underground Mailboxes 00:15:27
• Well-Known Security Incidents 1973-2001 00:21:29
• Well-Known Security Incidents 2001-2012 00:18:45

Internet Weaknesses and Targets

Not enough ratings.
Date: 09.01.2013
Lang.: en
Dur.: 01:13:49
Play full lecture
• Introduction 00:10:59
• Spying out Personal Data 00:15:05
• Java 00:19:49
• JavaScript 00:15:23
• PDF 00:12:33
Not enough ratings.
Date: 16.01.2013
Lang.: en
Dur.: 01:03:41
Play full lecture
• Introduction 00:18:57
• SQL-Injection 00:11:26
• Cross-Site-Scripting 00:11:25
• Cross-Site Request Forgery 00:11:59
• WS-Security - Security Tokens 00:09:54
Not enough ratings.
Date: 22.11.2012
Lang.: en
Dur.: 00:29:39
Play full lecture
• Introduction 00:16:39
• Social Hacking 00:13:00
Not enough ratings.
Date: 21.11.2012
Lang.: en
Dur.: 00:29:53
Play full lecture
• Introduction 00:16:04
• Web Recon 00:13:48
Not enough ratings.
Date: 22.11.2012
Lang.: en
Dur.: 00:30:20
Play full lecture
• Introduction 00:16:39
• TCP/IP Timeout Detection 00:13:41
Not enough ratings.
Date: 28.11.2012
Lang.: en
Dur.: 01:02:34
Play full lecture
• Introduction 00:09:02
• Password Guessing 00:09:51
• Password Cracking 00:10:49
• Password Cracking with Rainbow Tables 00:15:08
• Password Sniffing and Monitoring 00:03:47
• Phishing - Password Fishing 00:10:56
• Protection Against Password Theft 00:03:10
Not enough ratings.
Date: 05.12.2012
Lang.: en
Dur.: 01:28:41
Play full lecture
• Introduction 00:10:35
• Attack Scenarios 00:10:09
• ICMP-Attacks 00:20:47
• Internet-Routing-Attacks 00:11:40
• ARP-Attacks 00:11:32
• IP-Fragmentation Attacks 00:15:39
Not enough ratings.
Date: 07.12.2012
Lang.: en
Dur.: 01:20:22
Play full lecture
• Introduction 00:11:00
• Attack Scenarios 00:09:41
• TCP-Sequence-Number Attack 00:14:21
• Cancel/Hijack TCP-Connections 00:16:49
• DNS-Attacks 00:08:37
• Telnet Attacks 00:21:54
Not enough ratings.
Date: 12.12.2012
Lang.: en
Dur.: 00:32:42
Play full lecture
• Introduction 00:20:05
• Defective Syntax Check 00:12:37
Not enough ratings.
Date: 12.12.2012
Lang.: en
Dur.: 01:12:38
Play full lecture
• Introduction 00:10:46
• Attacks at Boot-Time 00:11:49
• Breaking out of Runtime Enviroments 00:15:15
• Network Attacks in Unix via NFS 00:14:34
• Strategies to Protect Unix-Systems 00:20:14
Not enough ratings.
Date: 19.12.2012
Lang.: en
Dur.: 01:17:32
Play full lecture
• Introduction 00:12:46
• SMB Relay Attack 00:19:34
• Remote Desktop Attacks 00:11:35
• Kerberos Authentification Review 00:17:15
• Defeating Buffer Overflow Prevention 00:16:22
Not enough ratings.
Date: 23.01.2013
Lang.: en
Dur.: 01:29:01
Play full lecture
• Introduction 00:16:25
• WLAN Parameters 00:20:38
• WLAN Security with IEEE 802.1x 00:08:51
• Extended WLAN Security 00:16:20
• WLAN Security in Practice 00:15:21
• Cellular Phone - Authentication 00:11:26

Detection of Attacks and Intrusions

Not enough ratings.
Date: 30.01.2013
Lang.: en
Dur.: 01:24:32
Play full lecture
• Introduction 00:15:40
• Anomalies 00:15:59
• Anti-Virus Software 00:12:34
• Implementation of IDS 00:16:42
• Event Correlation 00:14:09
• Limits of IDS 00:09:27

Legal and Ethical Issues in Internet Security

Not enough ratings.
Date: 06.02.2013
Lang.: en
Dur.: 01:08:49
Play full lecture
• Introduction 00:13:38
• German Criminal Law 00:17:21
• Case Study: Publishing Hacker Tools 00:11:58
• Ethical Issues 00:13:56
• Ownership of Programs 00:11:56
Tags added to this content

No tags have been added to this content so far.

Tag this content

Please enable javascript to use this function.

Dear user,
with the tagging function you'll be able to add taggs to videos.
However, in order to link all your tags with your user profile it is required that you
login to the tele-TASK portal to use this functionality.
If you don't have an account yet, you may register for a tele-TASK account here.
Links added to this content

No links have been added to this content so far.

Add Link to this content

Please enable javascript to use this function.

Dear user,
with the links function you'll be able to add links to other resources to this content.
However, in order to link all your links with your user profile it is required that you
login to the tele-TASK portal to use this functionality.
If you don't have an account yet, you may register for a tele-TASK account here.