EIT ICT Labs MASTER SCHOOL. Specialisations

Size: px
Start display at page:

Download "EIT ICT Labs MASTER SCHOOL. Specialisations"

Transcription

1 EIT ICT Labs MASTER SCHOOL Specialisations

2 S&P EIT ICT Labs Master Programme Security & Privacy The Learning outcomes of this major are: Understanding the concepts and technologies for achieving confidentiality, integrity, authenticity, and privacy protection for information processed across networks. Mastering the key principles underlying a constructive approach to secure systems, including threat characterization and subversion; confinement; fundamental abstractions, principles, and mechanisms; and life-cycle assurance. Being able to apply fundamental Information Systems Security Engineering principles and processes, as applied to the stages a life-cycle model in the context of a defence-in-depth protection strategy Recognizing potential vulnerabilities in networked systems by studying methods to obtain information about remote networks and how to exploit or subvert systems on that network. Being able to use current tools and techniques for assessing network attacks and vulnerability and for systematically reducing vulnerabilities and mitigating risks. Ability to examine security engineering concepts and practices from a system lifecycle perspective based on a systems thinking approach that supports assessment of system security behaviours based on dependencies, interactions, and emergent properties of system components in the context of functionality, scalability, interoperability, and maintainability. Competences in communication, knowledge integration, open innovation and technology management from the viewpoints of both business and technology. Business skills to understand and execute a business development process, and have insight in legal and societal aspects of security and privacy. More information: Contact: Jean-Pierre Seifert

3 Specialisations Specialisations are provided during the second year. The S&P major offers 6 specialisations, each at a different location. To meet the requirements for geographic mobility, the chosen exit point needs to differ from the chosen entry point. High Assurance Systems at TU Berlin Applied Security at University of Trento System Security at TU Darmstadt Information Security and Privacy at University of Saarbrücken Advanced Cryptography at ELTE Network Security at University of Twente

4 High Assurance Systems (TU Berlin) Jean-Pierre Seifert studied computer science and mathematics at Johann-Wolfgang-Goethe-University in Frankfurt/Main. He received his PhD with distinction under Prof. Dr. Claus Schnorr, one of the most important figures in the field of secure information systems. Afterwards Seifert gained intensive practical experience working in the research and development departments for hardware security at Infineon (Munich) and Intel (Portland). At Intel, Prof. Seifert has been responsible for the design and integration of new CPU security instructions for their micro-processors that are now present in all Intel micro-processors. From 2007 to 2008 he developed the worldwide first commercial secure cell-phone for Samsung Electronics (San Jose) based on the Linux operating system. Since the end of 2008 Jean-Pierre Seifert has been a full Professor chairing the group Security in Telecommunications at TU Berlin. This professorship is at the same time related with the management of the identically-named research field at Deutsche Telekom Laboratories, the research and development institute of Deutsche Telekom at TU Berlin. In 2002 Prof. Seifert has been honored by Infineon with the Inventor of the Year award and has received as well two Intel Achievement Awards in 2006 for his new CPU security instructions for the Intel micro-processors. More than 40 patents have been granted to Prof. Seifert in the field of computer security. Security and Privacy are the main aspects of what customers expect from IT-based systems. Moreover, customers need to trust the dependability of the systems, which in addition to confidentiality and integrity comprises availability and robustness. The specialisation focuses on the interrelationship between security aspects and dependability, thus putting security in a wider context and exploring its role in this context. Contact: Jean-Pierre Seifert

5 High Assurance Systems Specialisation Mandatory Courses (min. 20 ECTS): Hardware Security Telecommunication Security Foundations of Computer Security Advanced Computer Security Topics Dependable and Secure Systems 4-8 ECTS 4-8 ECTS 4-8 ECTS 4-8 ECTS 4-8 ECTS

6 Network Security (University of Twente) Prof. Dr. Frank Kargl is Professor at the Distributed and Embedded Security (DIES) Research Group at University of Twente in the Netherlands. Beyond, he is also chair of distributed systems at University of Ulm, Germany. His research focuses on security and privacy in mobile systems and wireless networks, especially investigating Intelligent Transport Systems and Vehicle Networks. Among other activities, he is the coordinator of the European research project PRESERVE where a practical V2X security solution is developed and field tested. Beyond, he is also involved in a lot of other research and teaching activities, notably teaching the security and privacy in the Mobile Systems Course. This specialisation looks at security of communication networks in all their forms, putting emphasis on newer developments and special challenges arising thereby. One special focus is emerging wireless and dynamic networks like ad-hoc networks, WSNs, or VANETs where issues like collaboration incentives or the absence of protection perimeters lead to new forms of security systems that may also become relevant in a future more dynamic internet. The specialisation extends network security knowledge from the basic course in year 1. It introduces new aspects of network security, like security and privacy in mobile systems or cyber crime. The specialisation takes a very practical approach to network security as it includes a mandatory hands-on lab, the so-called Hacker s Hut. Motivation: Networked systems get more and more ubiquitous and diverse. They are applied in more and more critical systems now, including sensor networks, smart meters, industrial control systems, and the Internet. Especially incarnations of wireless communication and dynamic forms of networking like P2P or ad-hoc networks raise new security and privacy challenges. Wireless communication facilitates eavesdropping or denialof-service attacks, dynamic networking like in Vehicular Ad-hoc Networks creates issues about enforcing collaboration, data consistency, etc.. So a strong background in network security and its various forms is a highly interesting specialisation for a security expert. Contact: Frank Kargl

7 Network Security Specialisation Mandatory Courses (12 ECTS): Security and Privacy in Mobile Systems Practical Network Security Lab Hacker s Hut Network Security Specialisation Electives: Cyber Crime Science Secure Data Management

8 Advanced Cryptography (ELTE) Peter Sziklai got his PhD at Eötvös L. University, Budapest, in He is an associate professor at the Department of Computer Science at Eötvös University, and leads the ELTECRYPT applied research group there. Besides his teaching duties he is an advisor of MSc and PhD students and takes part in several pure and applied research projects at national and international level. Levente Buttyán earned his Ph.D. degree from the Swiss Federal Institute of Technology - Lausanne (EPFL) in He is an associate professor at BUTE and leads the Laboratory of Cryptography and Systems Security (CrySyS Lab). His main research interests are in the design and analysis of secure protocols and privacy enhancing mechanisms for wireless networked embedded systems (including wireless sensor networks, mesh networks, vehicular communications, and RFID systems). Recently, he has been involved in the analysis of Duqu and Flame (aka skywiper), two pieces of important malware related to Stuxnet and cyber espionage in the Middle East. Levente Buttyán has carried out and leaded research in various international research projects. Besides research, he has been teaching courses on network security and electronic commerce in the MSc program at BUTE, and gave invited lectures at various places. He is also providing consulting services, and he has recently founded a spin-off called Tresorit with some of his students. Security and Privacy are crucial issues for citizens and customers using IT-based systems. The specialisation focuses on the general ideas, techniques and methods of Applied Cryptography as well as on the theoretical background and solid knowledge, putting security in a wider context. Security and Privacy is considered both from the technological and from the economical point of view, which supports decisions in many practical cases. Applied cryptography serves as a base for most of the secure IT-systems (e.g. in Future Media and Content Delivery, Smart Spaces, Digital cities, Health and ICT-Mediated Human Activity, and Enabling the Internet of the Future).

9 Graduates are able to manage all the typical cryptographic challenges in IT-Systems, able to develop cryptosystems under various circumstances, aware of the theoretical and practical background, and offered internships at our partner IT companies and research institutes. Contact: Peter Sziklai + Levente Buttyán Advanced Cryptography Specialisation Mandatory Courses (24 ECTS): Advanced Cryptography Cryptography and its Applications Cryptographic Protocols Economics of Security and Privacy Advanced Cryptography Specialisation Electives: Applied Cryptography Project Seminar

10 Information Security and Privacy (Saarland University) Prof. Michael Backes is the coordinator of the Security and Privacy major at Saarland University, Germany. He is a full professor at the Department of Computer Science and leads the Center for IT- Security, Privacy and Accountability (CISPA) located at Saarland University. In addition, he founded a spin-off company called Backes:SRT that develops technologies to improve data protection in secure communication. Furthermore, he is supervising 10 graduate students which are highly involved in teaching and advising bachelor s and master s theses. Christian Hammer is an assistant professor at CISPA, Saarland University and is the faculty contact for the Security and Privacy major at this node. His research interests includes systems security, in particular for the andriod platform, and web security in the context of javascript. His research on security for programming languages centers around information flow control techniques, that control where secret infromation is allowed to be used. He also collaborates with IBM Research to investigate secure multicore programming. The Information Security and Privacy specialisation connects provably secure and privacypreserving concepts with practically deployable applications. This area offers many possible directions for the students such as Android Security, Web Security, or Synthesis of Distributed Applications, to name a few. Working on these concrete domains, the student learns how to use complex cryptographic primitives as well as information flow analyses in order to guarantee privacy of software systems. In the last 6 months of their studies, students choose a topic for their master s thesis. The topic can be based on an idea of the student, or the student can approach a professor to suggest a topic tailored to the individual interest and previous knowledge of the student. For instance, a student interested in android security could contribute to AppGuard, which is an application allowing selective revocation of permissions on android. Contact: Michael Backes + Christian Hammer

11 Information Security and Privacy Specialisation Electives (34 ECTS): Information Security and Privacy Privacy Enhancing Technologies Formal Methods in Information Security and Privacy Practical Aspects of Information Security Seminar on Selected Topics in Information Security and Privacy 9 ECTS 7 ECTS

12 System Security (TU Darmstadt) Prof. Dr. Matthias Hollick is a full professor at TU Darmstadt, where he is heading the Secure Mobile Networking Lab (SEEMOO), which is part of the Center for Advanced Security Research Darmstadt (CASED). His research interests lie in the areas of security, resiliency, and quality of service for mobile and wireless networks. Prof. Dr. Stefan Katzenbeisser is a full professor at TU Darmstadt, where he is heading the Secureity Engineering Lab (SecEng). His main research interests are in the area of the design and analysis of cryptographic protocols, privacy-enahnaicng technologies, and software security. The system security specialisation emphasizes on the IT security aspects of large and complex networked systems such Smart Energy Systems, Digital Cities, the Future Internet, etc. It thus provides a direct link to the respective thematic areas of the EIT ICT Labs research and innovation agenda. These areas are characterized by an increasing complexity of the underlying ICT systems. More precisely, they comprise a multitude of software and hardware components, which in combination form complex ICT systems. IT security and privacy needs to acknowledge such complex ICT, and go beyond a narrow and specialized focus. With the system security specialisation, TU Darmstadt will equip the next generation of security researchers, entrepreneurs, and professionals with the necessary knowledge to master ICT security and privacy in a networked world. Contact: Matthias Hollick + Stefan Katzenbeisser Specialisation courses (the course catalogue varies for the 3 rd and 4 th term; courses marked with an asterisk (*) are generally offered in the summer term. I.e. they are available, if the students perform their final thesis already in the 3 rd term of the master program).

13 System Security Specialisation Mandatory Courses (min. 2): Secure, Trusted and Trustworthy Computing Static and Dynamical Program Analysis * Operating Systems II: Dependability and Trust 8 ECTS * Privacy-Enhancing Technologies 3 ECTS Seminars/advanced seminars 3-4 ECTS System Security Specialisation Electives 3 rd Term: Security Requirements Engineering Cryptographic Pearls Post-quantum Cryptography Operating Systems Lab Exercises in System Security 4 ECTS 8 ECTS 3 - System Security Specialisation Electives 4 th Term: Security Requirements Engineering 4 ECTS * Secure Mobile Systems 3 ECTS * Embedded System Security * Cryptographic Protocols * Formal Methods in Information Security 9 ECTS Lab Exercises in System Security 3 -

14 Applied Security (University of Trento) Prof. Dr. Fabio Massacci received a M.Eng. in 1993 and Ph.D. in Computer Science and Engineering at University of Rome La Sapienza in He visited Cambridge University in and was visiting researcher at IRIT Toulouse in He joined the University of Siena as assistant professor in 1999, and in 2001 he became a full professor at the University of Trento.His research interests are in security requirements engineering and verification and load-time security for mobile and embedded systems (Securityby-Contract). He co-founded the ESSOS with W. Jousen, Engineering Secure Software and Systems Symposium, which aims at bringing together requirements, software engineers and security experts. He was leading the Empirical Security Requirements and Risk Engineering Challenge (ERISE). He has been a scientific coordinator of multimillion-euro EU projects on security compliance, security engineering and secure evolution. In many practical contexts such as Digital Cities or Smart Energy Systems, Security and Privacy are seen by IT vendors as additional costs which customers are not really willing to pay for. Even in the framework of cyber security low protection mechanisms might be chosen to save costs. The specialisation focuses on the challenge of guaranteeing the right level of security to an application that is substantiated by empirical evidence. Graduates are able to: identify the appropriate security technology that can be deployed develop appropriate solutions for the industry scenarios of cyber security and citizen s security describe and justify the benefits for such choices based on empirical results Contact: Fabio Massacci

15 Applied Security Specialisation Mandatory Courses (): Empirical Methods for Security Applied Security Specialisation Electives: Laboratory of Applied Cryptography Laboratory of Network and System Security Applied Formal Methods for Security

EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations

EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The programme in Security and Privacy focuses on the study of the design, development and evaluation

More information

EIT Education & the EIT ICTLabs Master School. Prof. Fabrizio Granelli Local Master School Coordinator, UNITN

EIT Education & the EIT ICTLabs Master School. Prof. Fabrizio Granelli Local Master School Coordinator, UNITN EIT Education & the EIT ICTLabs Master School Prof. Fabrizio Granelli Local Master School Coordinator, UNITN Education, EIT & UNITN Maurizio Marchese Fabrizio Granelli Director of Education Local MS coordinator

More information

EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations

EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations DSS EIT ICT Labs Master Programme Distributed System and Services (Cloud Computing) The programme in Distributed Systems and Services focuses on

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Master s Programme in ICT Innovation

Master s Programme in ICT Innovation Master s Programme in ICT Innovation Degree Programme in Computer Science and Engineering Degree: Master of Science in Technology M.Sc. (Tech) 120 ECTS Majors: Digital Media Technology (xxxx) Distributed

More information

Computer. Welcome to the Faculty of Electrical Engineering, Mathematics and Computer Science! master s degree

Computer. Welcome to the Faculty of Electrical Engineering, Mathematics and Computer Science! master s degree master s degree Computer Science Welcome to the Faculty of Electrical Engineering, Mathematics and Computer Science! For us the world is flat. Electrical Engineering, Mathematics and Computer Science have

More information

Deliverable D13.2 Report describing the curricula for a master in Security Engineering for Future Internet Services and the co-tutela program setup

Deliverable D13.2 Report describing the curricula for a master in Security Engineering for Future Internet Services and the co-tutela program setup Network of Excellence on Engineering Secure Future Internet Software Services and Systems Network of Excellence Deliverable D13.2 Report describing the curricula for a master in Engineering for Future

More information

COOPERATION AGREEMENT. EIT ICT Labs Master s Education. in Security & Privacy

COOPERATION AGREEMENT. EIT ICT Labs Master s Education. in Security & Privacy COOPERATION AGREEMENT Hereinafter referred to as this Agreement CONCERNING EIT ICT Labs Master s Education in Security & Privacy Preamble EIT ICT Labs IVZW (EIT ICT Labs) is embodying one of the first

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

11741 E-Business Credit Hours: 3 11752 Integrated Application Systems Credit Hours: 3 11742 Enterprise Systems Architecture Credit Hours: 3

11741 E-Business Credit Hours: 3 11752 Integrated Application Systems Credit Hours: 3 11742 Enterprise Systems Architecture Credit Hours: 3 11741 E-Business E-Business is radically changing the ways in which business organizations operate and compete in the global market. This course introduces students to various aspects and models for e-business.

More information

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group 1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is

More information

Seminar: Security Metrics in Cloud Computing (20-00-0577-se)

Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

EIT ICT Labs Education Systematic Approach to EIT Label. Prof. Dr.h.c Prof.h.c Hannu Tenhunen Education Director

EIT ICT Labs Education Systematic Approach to EIT Label. Prof. Dr.h.c Prof.h.c Hannu Tenhunen Education Director EIT ICT Labs Education Systematic Approach to EIT Label Prof. Dr.h.c Prof.h.c Hannu Tenhunen Education Director Our Education Strategy aims at breeding and attracting top talents EIT ICT Labs Education

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

Le sfide per il Sistema della Ricerca Trentino nell ambito della gestione dell Identità Digitale

Le sfide per il Sistema della Ricerca Trentino nell ambito della gestione dell Identità Digitale Le sfide per il Sistema della Ricerca Trentino nell ambito della gestione dell Identità Digitale Alessandro Armando Security & Trust Research Unit Fondazione Bruno Kessler Identità Digitale: il ruolo della

More information

EIT ICT Labs MASTER SCHOOL ITA Programme Specialisations

EIT ICT Labs MASTER SCHOOL ITA Programme Specialisations EIT ICT Labs MASTER SCHOOL ITA Programme Specialisations ITA EIT ICT Labs Master Programme Internet Technology and Architecture The programme in Internet Technology and Architectures focuses on studies

More information

Security and Privacy in Big Data, Blessing or Curse?

Security and Privacy in Big Data, Blessing or Curse? Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology

More information

Orientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS. Information Systems. Prof. Dr.

Orientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS. Information Systems. Prof. Dr. Orientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS Information Systems Prof. Dr. Stefan Lessmann Agenda What it is about Information Systems Who we are What

More information

Dept. of Financial Information Security

Dept. of Financial Information Security Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators

More information

I m visualizing large datasets to generate

I m visualizing large datasets to generate GRADUATE SCHOOL 2015-2016 I m visualizing large datasets to generate new insights Graduate program Computer Science * This major is formally part of the Computer Science & Engineering Bachelor program

More information

Applied and Integrated Security. C. Eckert

Applied and Integrated Security. C. Eckert Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass

More information

EIT ICT Labs The ICT Innovation Catalyst for Europe

EIT ICT Labs The ICT Innovation Catalyst for Europe Start-Chart EIT ICT Labs The ICT Innovation Catalyst for Europe Prof. Dr. Willem Jonker CEO willem.jonker@ictlabs.eu EIT ICT Labs mission is to turn Europe into a global leader in ICT Innovation Breed

More information

EIT ICT Labs Master Programme Internet Technology and Architecture (ITA)

EIT ICT Labs Master Programme Internet Technology and Architecture (ITA) EIT ICT Labs Master Programme Internet Technology and Architecture (ITA) The ITA master is a new European two-year master programme within the EIT master school ICT Innovation. The aim of the EIT (European

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Network Security Course Specifications2011-2012

Network Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and

More information

Cyber Security and Privacy - Program 183

Cyber Security and Privacy - Program 183 Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

APPLIED AND INTEGRATED SECURITY

APPLIED AND INTEGRATED SECURITY APPLIED AND INTEGRATED SECURITY Directors: Claudia Eckert (Managing) Georg Sigl SECURITY RESEARCH IN MUNICH Fraunhofer Institution for Applied and Integrated Security Claudia Eckert Georg Sigl TU München

More information

future data and infrastructure

future data and infrastructure White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal

More information

2. Cyber security research in the Netherlands

2. Cyber security research in the Netherlands 2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed

More information

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

ICT MASTER PROGRAMME for Information Security / Mobile Services

ICT MASTER PROGRAMME for Information Security / Mobile Services ICT MASTER PROGRAMME for Information Security / Mobile Services 14.3.2006 Murmansk Development Manager History and Background Founded 1969 as an independent department, joined Faculty of Science in 1987

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

3TU Master of Science in Systems and Control. An essential engineering qualification for future decades

3TU Master of Science in Systems and Control. An essential engineering qualification for future decades 3TU Master of Science in Systems and Control An essential engineering qualification for future decades The challenge of Systems and Control As the complexity and importance of our many industrial structures

More information

Master of Science in Information Systems & Security Management. Courses Descriptions

Master of Science in Information Systems & Security Management. Courses Descriptions Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course

More information

Centre for Entrepreneurship. Master of Science in. Innovation and. graduate

Centre for Entrepreneurship. Master of Science in. Innovation and. graduate Centre for Entrepreneurship Master of Science in Innovation and Entrepreneurship graduate Prospectus WELCOME WELCOME Contents The University of Oslo Students currently studying at the Centre for Entrepreneurship

More information

Overview TECHIS60441. Carry out security testing activities

Overview TECHIS60441. Carry out security testing activities Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

2013-04-16 to 2013-04-19. Hanno Langweg, Einar Snekkenes (HiG)

2013-04-16 to 2013-04-19. Hanno Langweg, Einar Snekkenes (HiG) COINS study tour 2013-04-16 to 2013-04-19. Hanno Langweg, Einar Snekkenes (HiG) Seven institutions were selected to collect their experience with Ph.D. training in security and computer science. The selection

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Associate Prof. Dr. Victor Onomza Waziri

Associate Prof. Dr. Victor Onomza Waziri BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,

More information

IT Security in Industrie 4.0

IT Security in Industrie 4.0 IT Security in Industrie 4.0 Prof. Dr. Michael Waidner TU Darmstadt & Fraunhofer Institute for Secure Information Technology? AUTONOMIK Innovation Days Berlin, June 17-18, 2014 1. What is Industrial IT

More information

WELCOME to the MASTER in Computer Science and Communication Systems

WELCOME to the MASTER in Computer Science and Communication Systems Ecole Polytechnique Fédérale de Lausanne EPFL School of Computer and Communication Sciences IC 1 WELCOME to the MASTER in Computer Science and Communication Systems 2 1 TODAY S SPEAKERS Prof. Bernard Moret:

More information

Future cybersecurity threats and research needs.

Future cybersecurity threats and research needs. www.thalesgroup.com Future cybersecurity threats and research needs. 3 rd Franco-American Workshop on Cybersecurity Lyon Kreshnik Musaraj kreshnik.musaraj@thalesgroup.com December 9. 2014 2 / Challenges

More information

Telecommunication (120 ЕCTS)

Telecommunication (120 ЕCTS) Study program Faculty Cycle Software Engineering and Telecommunication (120 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program This master study

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

Ecole Polytechnique Fédérale de Lausanne EPFL School of Computer and Communication Sciences IC. School of Computer and Communication Sciences

Ecole Polytechnique Fédérale de Lausanne EPFL School of Computer and Communication Sciences IC. School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne EPFL School of Computer and Communication Sciences IC 1 WELCOME to the MASTER in Computer Science and Communication Systems 2 TODAY S SPEAKERS Prof. Paolo Ienne:

More information

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America 1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:

More information

Resilient Networks. 00. Preliminaries. Who is who. Organizational Issues. P2P, TK What do we do. Exercise course Rough time line Examination

Resilient Networks. 00. Preliminaries. Who is who. Organizational Issues. P2P, TK What do we do. Exercise course Rough time line Examination Resilient Networks 00. Preliminaries Who is who P2P, TK What do we do Organizational Issues Exercise course Rough time line Examination 23.04.2013 Fachbereich Informatik P2P Group and Telecooperation Group

More information

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and, Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already

More information

Master s Programme in Service Design and Engineering 2010-12

Master s Programme in Service Design and Engineering 2010-12 Master s Programme in Service Design and Engineering 2010-12 Degree Programme of Computer Science and Engineering Degree: Master of Science in Technology M.Sc. (Tech) 120 ECTS Major: Service Design and

More information

Cyber Security Review

Cyber Security Review ISSN 2055-6950 (Print) ISSN 2055-6969 (Online) Cyber Security Review Winter 2014/15 CYBERCRIME AS A NATIONAL SECURITY ISSUE CECSP: TOWARDS EFFECTIVE COLLABORATION ON CYBER SECURITY IN CENTRAL EUROPE TECHNICAL

More information

The Danish Cyber and Information Security Strategy

The Danish Cyber and Information Security Strategy February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives

More information

Master of Science in Business Administration

Master of Science in Business Administration BRUSSELS t Master of Science in Business Administration Majors: International Business Management Business Information Management International Relations Faculty of Economics and Business Campus Brussels

More information

European Network for Cyber Security

European Network for Cyber Security European Network for Cyber Security Cyber Security: a fundamental basis for Smart Grids Project Summary December 19, 2014 Introduction Smart grids are crucial to support the use of more sustainable energy

More information

Graduate Business Programs SDSU College of Business Administration. MBA Program of Study Worksheet. Information Systems Specialization

Graduate Business Programs SDSU College of Business Administration. MBA Program of Study Worksheet. Information Systems Specialization Graduate Business Programs SDSU College of Business Administration MBA Program of Study Worksheet Information Systems Specialization MBA Program of Study Worksheet: Information Systems Specialization The

More information

Introducing the EIT ICT Labs Budapest Associate Partner Group

Introducing the EIT ICT Labs Budapest Associate Partner Group Introducing the EIT ICT Labs Budapest Associate Partner Group Prof. Dr. Zoltán Horváth EIT ICT Labs Conference, Budapest 05 March, 2013 Contents The partners and the Co-location Centre National Development

More information

MASTER OF SCIENCE (MSc) IN ENGINEERING (SOFTWARE ENGINEERING) (Civilingeniør, Cand. Polyt. i Software Engineering)

MASTER OF SCIENCE (MSc) IN ENGINEERING (SOFTWARE ENGINEERING) (Civilingeniør, Cand. Polyt. i Software Engineering) Chapter 9 The programme specific part of the curriculum for: MASTER OF SCIENCE (MSc) IN ENGINEERING (SOFTWARE ENGINEERING) (Civilingeniør, Cand. Polyt. i Software Engineering) Applicable to students admitted

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Trust areas: a security paradigm for the Future Internet

Trust areas: a security paradigm for the Future Internet Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de

More information

The Internet of Things Risks and Challenges

The Internet of Things Risks and Challenges The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Introduction to MSc Program in Operations Management & Logistics

Introduction to MSc Program in Operations Management & Logistics Introduction to MSc Program in Operations Management & Logistics Today s program What is OML? The Master s Program Program structure International semester Thesis After OML Student experience / School

More information

NETWORKING COURSES @ UNITN. Fabrizio Granelli Networking area coordinator granelli@disi.unitn.it

NETWORKING COURSES @ UNITN. Fabrizio Granelli Networking area coordinator granelli@disi.unitn.it NETWORKING COURSES @ UNITN Fabrizio Granelli Networking area coordinator granelli@disi.unitn.it Networking specialization Prof. F. Granelli Wireless networks: Architecture, protocols and performance: WiFi

More information

Academic regulations for the Master of Science in Engineering (Technology Based Business Development)

Academic regulations for the Master of Science in Engineering (Technology Based Business Development) Aarhus University School of Business and Social Sciences AU Herning Academic regulations for the Master of Science in Engineering (Technology Based Business Development) September 2014 Table of contents

More information

Hybrid Risk Management for Utility Networks

Hybrid Risk Management for Utility Networks Hybrid Risk Management for Utility Networks Hermann de Meer hermann.demeer@uni-passau.de Computer Networks and Computer Communications Lab (CNACC) University of Passau CNACC: Introduction People Prof.

More information

Setting Processes for Electronic Signature

Setting Processes for Electronic Signature Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000

More information

Cyber Security in the University of Oxford: Collaborating without Conforming?

Cyber Security in the University of Oxford: Collaborating without Conforming? Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity

More information

Vampire Attack Detecting and Preventing in Wireless Sensor Network

Vampire Attack Detecting and Preventing in Wireless Sensor Network International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in

More information

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile

More information

Towards Trustworthy Clouds

Towards Trustworthy Clouds IBM Research Zurich Christian Cachin 12 September 2013 Towards Trustworthy Clouds 2009 IBM Corporation Cloud computing? 2 Cloud services are convenient No investment cost Pay only for consumption Scalable

More information

Enabling the secure use of RFID

Enabling the secure use of RFID Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises

More information

3TU MSc in Construction Management and Engineering. Creating the construction leaders of the future

3TU MSc in Construction Management and Engineering. Creating the construction leaders of the future 3TU MSc in Construction Management and Engineering Creating the construction leaders of the future The challenge of Construction Management and Engineering Today s construction industry is changing fast.

More information

Juniper Networks Secure

Juniper Networks Secure White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3

More information

Master of Science (version of 15th December 2004)

Master of Science (version of 15th December 2004) Course Regulations for the Masters degree programme in Geodesy and Geoinformation Science at Faculty VI (Civil Engineering and Applied Earth Sciences) of the Technical University of Berlin leading to the

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

EIT ICT Labs MASTER SCHOOL ES Programme Specialisations

EIT ICT Labs MASTER SCHOOL ES Programme Specialisations EIT ICT Labs MASTER SCHOOL ES Programme Specialisations ES EIT ICT Labs Master Programme Embedded Systems The programme in Embedded Systems focuses on enabling technologies and design methodologies for

More information

The Importance of Secure Elements in M2M Deployments: An Introduction

The Importance of Secure Elements in M2M Deployments: An Introduction The Importance of Secure Elements in M2M Deployments: An Introduction February 2014 Securing the future of mobile services 2 Contents THE IMPORTANCE OF SECURE ELEMENTS IN M2M DEPLOYMENTS... 3 1. INTRODUCTION...

More information

Graduate Business Programs SDSU College of Business Administration. MBA Program of Study Worksheet. Accounting Specialization

Graduate Business Programs SDSU College of Business Administration. MBA Program of Study Worksheet. Accounting Specialization Graduate Business Programs SDSU College of Business Administration MBA Program of Study Worksheet Accounting Specialization MBA Program of Study Worksheet: Accounting Specialization The MBA requires a

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Secure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing

Secure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing Secure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing Prof. Dr. Ahmad-Reza Sadeghi TU Darmstadt Academic Principal Investigator and Director Dr. Matthias Schunter

More information

Masters in Applied Cyber Security Upskilling Existing Employees

Masters in Applied Cyber Security Upskilling Existing Employees Masters in Applied Cyber Security Upskilling Existing Employees Origination The Masters in Applied Cyber Security (MACS) emerged from discussions at the Steering Group of ICT Ireland Skillnet where companies

More information

Customised programmes

Customised programmes Customised programmes for your company s needs Design your education programme Table of Contents P03 Steinbeis Business Academy P04 Your benefit - Project Competence Concept P05 Added value for the customer

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

Master of Communication Studies New Media and Society in Europe

Master of Communication Studies New Media and Society in Europe Master of Communication Studies New Media and Society in Europe A one-year programme in English focusing on one of the most dynamic sectors in Europe. Master of Communication Studies The Master of Communication

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

Current and Future Research into Network Security Prof. Madjid Merabti

Current and Future Research into Network Security Prof. Madjid Merabti Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition

More information

IoT Potential Risks and Challenges

IoT Potential Risks and Challenges IoT Potential Risks and Challenges GRIFES / GITI / EPFL Alumni Conference, Lausanne, May 7 th, 2015 Stefan Schiller, HP ESP Fortify Solution Architect D/A/CH IoT Potential Risks and Challenges Agenda IDC

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

THE MASTER'S DEGREE IN INFORMATION STUDIES

THE MASTER'S DEGREE IN INFORMATION STUDIES Academic Regulations for THE MASTER'S DEGREE IN INFORMATION STUDIES THE FACULTY OF HUMANITIES THE UNIVERSITY OF AARHUS 2007 Revised June 2009 1. Framework Provisions Title Prepared by The Master s degree

More information

I m converting a monastery into a modern rehabilitation center

I m converting a monastery into a modern rehabilitation center GRADUATE SCHOOL 2015-2016 I m converting a monastery into a modern rehabilitation center Graduate program Built Environment * This major is formally part of the Computer Science & Engineering Bachelor

More information

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research The University of Alabama Cyber Research Initiatives Cyber Forensics Research Cyber Security Research Cyber Forensics Research Department of Criminal Justice College of Arts and Sciences Cyber Crime Research

More information

Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks

Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean advisor: Panos Papadimitratos January 2009 Abstract Vehicular Ad-hoc Networks (VANETs)

More information

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015) TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

More information