Archive entry: Lecture series: IT Security in the summer 2015

Hackers, Trojans and encryption. You're already familiar with these terms, but want more background information? You'd like to know in what areas IT security also plays a role? We cordially invite you to learn about the various aspects and impacts of IT security in simple and easy-to-comprehend lectures.

07.05.15: Integration von IT-Sicherheit beim Gestalten von IT-Landschaften

(Integrating IT security into the design of the IT landscape)

Presenter: Dr. Silvia Knittl, IAM Solution Architect at accessec GmbH

Abstract:

Large enterprises meanwhile rely on architecture-based approaches (enterprise architecture management, EAM) as a strategic management instrument for designing their IT landscapes. This requires viewing IT security as an integral part of the landscape. In the EAM area, tools and methods are available in the form of various frameworks such as TOGAF (The Open Group Architecture Framework), which are nevertheless very general and not related in any specific way to IT security. This lecture describes how IT security and IT architectures can be meshed with the help of the SABSA (Sherwood Applied Business Security Architecture) framework, which grew out of practical applications. Using real-world examples, the lecture illustrates how organizations can ascertain the requirements of various stakeholders in a structured fashion with the help of architecture mechanisms, and how these can be used to create the foundation of a future IT security architecture.

Profile:

Dr. Silvia Knittl studied computer science at Ludwig-Maximilian University (LMU) in Munich and obtained her doctorate at Technical University Munich (TUM), where she worked for several years at the Leibniz Supercomputing Center in the area of identity and access management. She has been an IT security and IT management consultant since 2012.

20.05.15: Gehackt werden sowieso nur die anderen -Praxisbeispiele für richtige digitale Sorglosigkeit

(Hackers are interested in everyone else – Practical examples of true digital carelessnes)

Lecturer: Dr. Wolfgang Hommel

Abstract:

At the beginning of the year, the German Federal Ministry for Information Security (BSI) issued a warning about "digital carelessness" among users, declaring that many lack the skills needed to detect risks and adequately protect themselves. We must do something to counteract this development. In this sometimes less-than-serious lecture, Dr Hommel discusses several examples of the risks associated with information security and data protection you may recognize. Adequate protection is relative. Popular security measures show how you can ease your conscience without having to actually raise the level of security. As the lecture suggests, ultimately, only analog measures can help combat digital carelessness.

Profile:

Wolfgang Hommel is the information security officer at the Leibniz Supercomputing Center (Bavarian Academy of Sciences) in Garching near Munich. He studied computer science at TUM and holds a doctorate and Habilitation from LMU. He conducts research in the area of software and data security and lectures at LMU and UniBW Munich on the subject of information technology, with a focus on security.

17.06.15: Vertrauenswürdige vernetzte Systeme

(Trustworthy connected system)

Lecturer: Prof. Dr.-Ing. Georg Carle, Technical University Munich

Abstract:

The Internet is an indispensable part of modern life. Yet, Internet-based services are exposed to innumerable threats, the magnitude of which has only become clear since the revelations detailed in documents made public by Edward Snowden. This lecture outlines to what extent trustworthy services can be implemented despite diverse threats.

Profile:

Prof. Dr.-Ing. Georg Carle holds the Chair for Network Architectures and Network Services at the Technical University Munich and serves as Information Officer and RBG Director for the Department of Computer Science. He studied electrical engineering at Stuttgart University and the Ecole Nationale Supérieure des Télécommunications in Paris. He also obtained a Master's of Science in Digital Systems at Brunel University in London. He obtained his doctorate in 1996 at the Karlsruhe University Institute of Telematics as a scholarship fellow in a post-graduate program on the topic of managing complex systems. In 1997, he was a fellow at the Eurécom Institute in Sophia Antipolis. At the Fraunhofer Institute for Open Communication Systems (FOKUS) in Berlin, he headed up the Global Network Center of Competence, from where he went on to hold the newly-created Chair for Computer Networks and Internet at the University of Tubingen in December 2002. He started at TUM in 2008, where his activities focus on Internet technologies and network security.

01.07.15: Online-Durchsuchung & Co.:Technische Ermittlungswerkzeuge im offenen und verdeckten Einsatz

(Online searches: The open and covert use of technical investigative tools)

Lecturer: Prof. Dr.-Ing. Felix Freiling, Friedrich-Alexander University, Erlangen-Nürnberg

Abstract:

Ever since the publication of the "Bavarian Trojan" by the Chaos Computer Club (CCC) in 2011, the covert use of technical investigative instruments, such as for online searches and source telecommunications monitoring, has become the talk of the town. How do these technologies function? What kind of forensic evidence can you obtain with them? Under what circumstances can they be used? This lecture attempts to take a critical assessment of these technologies.

Profile:

Felix Freiling holds the Chair for IT Security Infrastructures at Friedrich-Alexander University in Erlangen-Nürnberg (FAU). The research and teaching focus of his workgroup involves proactive IT security measures, the technical aspects of cyber criminality and digital forensics (securing and analyzing IT evidence). Felix Freiling has appeared before the German Federal Constitutional Court as an expert during cases involving online searches and data retention.