EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations
|
|
- Lynette Hubbard
- 8 years ago
- Views:
Transcription
1 EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations
2 S&P EIT ICT Labs Master Programme Security & Privacy The programme in Security and Privacy focuses on the study of the design, development and evaluation of secure computer systems, which are also capable of ensuring privacy for future ICT systems. It follows a constructive security approach to teach the very complex and challenging field of information assurance. The aim is to provide students with an understanding of the concepts and technologies for achieving confidentiality, integrity, authenticity, and privacy protection for information processed across networks. Topics include core network security principles, traffic filtering, traffic analysis, cryptography, tunneling and encapsulation, public-key infrastructure, remoteauthentication protocols, and virtual private networks.
3 The Learning outcomes of this programme are: Understanding the concepts and technologies for achieving confidentiality, integrity, authenticity, and privacy protection for information processed across networks. Mastering the key principles underlying a constructive approach to secure systems, including threat characterization and subversion; confinement; fundamental abstractions, principles, and mechanisms; and life-cycle assurance. Being able to apply fundamental Information Systems Security Engineering principles and processes, as applied to the stages a life-cycle model in the context of a defence-in-depth protection strategy Recognizing potential vulnerabilities in networked systems by studying methods to obtain information about remote networks and how to exploit or subvert systems on that network. Being able to use current tools and techniques for assessing network attacks and vulnerability and for systematically reducing vulnerabilities and mitigating risks. Ability to examine security engineering concepts and practices from a system lifecycle perspective based on a systems thinking approach that supports assessment of system security behaviours based on dependencies, interactions, and emergent properties of system components in the context of functionality, scalability, interoperability, and maintainability. Competences in communication, knowledge integration, open innovation and technology management from the viewpoints of both business and technology. Business skills to understand and execute a business development process, and have insight in legal and societal aspects of security and privacy. More information: Contact: Jean-Pierre Seifert
4 Specialisations Specialisations are provided during the second year. The S&P programme offers 6 specialisations, each at a different location. To meet the requirements for geographic mobility, the chosen exit point needs to differ from the chosen entry point. The specialisations cover: High Assurance Systems at TU Berlin Applied Security at University of Trento System Security at TU Darmstadt Information Security and Privacy at University of Saarbrücken Advanced Cryptography at ELTE Network Security at University of Twente
5 High Assurance Systems (TU Berlin) Jean-Pierre Seifert studied computer science and mathematics at Johann-Wolfgang-Goethe-University in Frankfurt am Main, Germany. He received his PhD with distinction under Prof. Dr. Claus Schnorr, one of the most important figures in the field of secure information systems. Afterwards Seifert gained intensive practical experience working in the Hardware Security R&D Departments at Infineon (Munich, Germany) and Intel (Portland, USA). At Intel, Prof. Seifert was responsible for the design and integration of new CPU security instructions that are now present in all Intel microprocessors. From 2007 to 2008, he developed the world s first commercially available secure cell-phone for Samsung Electronics (San Jose, USA) based on the Linux OS. Since late 2008, Jean-Pierre is a Full Professor and Chair of the Security in Telecommunications Group at TU Berlin (TUB). His professorship concurrently holds management responsibilities within the Security in Telecommunications Department at the Telekom Innovation Laboratories (T-Labs), Deutsche Telekom s R&D arm with offices at TUB. In 2002, Infineon honored Prof. Seifert with the Inventor of the Year award. In 2006, he received two Intel Achievement Awards for his contributions in securing Intel microprocessors. To date, Prof. Seifert has had over 40 patents granted in the computer security field. Contact: Jean-Pierre Seifert
6 High Assurance Systems Specialisation Mandatory Courses (min. 20 ECTS): Hardware Security Telecommunication Security Foundations of Computer Security Advanced Computer Security Topics Dependable and Secure Systems 4-8 ECTS 4-8 ECTS 4-8 ECTS 4-8 ECTS 4-8 ECTS
7 Network Security (University of Twente) Prof. Dr. Frank Kargl is professor at the Distributed and Embedded Security (DIES) Research Group at University of Twente in the Netherlands. Beyond, he is also chair of distributed systems at University of Ulm, Germany. His research focuses on security and privacy in mobile systems and wireless networks, especially investigating Intelligent Transport Systems and Vehicle Networks. Among other activities, he is the coordinator of the European research project PRESERVE where a practical V2X security solution is developed and field tested. Beyond, he is also involved in a lot of other research and teaching activities, notably teaching the security and privacy in the Mobile Systems Course. This specialisation looks at security of communication networks in all their forms, putting emphasis on newer developments and special challenges arising thereby. One special focus is emerging wireless and dynamic networks like ad-hoc networks, WSNs, or VANETs where issues like collaboration incentives or the absence of protection perimeters lead to new forms of security systems that may also become relevant in a future more dynamic internet. The specialisation extends network security knowledge from the basic course in year 1. It introduces new aspects of network security, like security and privacy in mobile systems or cyber crime. The specialisation takes a very practical approach to network security as it includes a mandatory hands-on lab, the so-called Hacker s Hut. Motivation: Networked systems get more and more ubiquitous and diverse. They are applied in more and more critical systems now, including sensor networks, smart meters, industrial control systems, and the Internet. Especially incarnations of wireless communication and dynamic forms of networking like P2P or ad-hoc networks raise new security and privacy challenges. Wireless communication facilitates eavesdropping or denialof-service attacks, dynamic networking like in Vehicular Ad-hoc Networks creates issues about enforcing collaboration, data consistency, etc.. So a strong background in network security and its various forms is a highly interesting specialisation for a security expert. Contact: Frank Kargl
8 Network Security Specialisation Mandatory Courses (12 ECTS): Security and Privacy in Mobile Systems Practical Network Security Lab Hacker s Hut Network Security Specialisation Electives: Cyber Crime Science Secure Data Management
9 Advanced Cryptography (ELTE - Eötvös Loránd University) Peter Sziklai got his PhD at Eötvös L. University, Budapest, in He is an Associate Professor at the Department of Computer Science at Eötvös University, and leads the ELTECRYPT applied research group there. Besides his teaching duties he is an advisor of MSc and PhD students and takes part in several pure and applied research projects at national and international level. Levente Buttyán earned his Ph.D. degree from the Swiss Federal Institute of Technology - Lausanne (EPFL) in He is an Associate Professor at BUTE and leads the Laboratory of Cryptography and Systems Security (CrySyS Lab). His main research interests are in the design and analysis of secure protocols and privacy enhancing mechanisms for wireless networked embedded systems (including wireless sensor networks, mesh networks, vehicular communications, and RFID systems). Recently, he has been involved in the analysis of Duqu and Flame (aka skywiper), two pieces of important malware related to Stuxnet and cyber espionage in the Middle East. Levente Buttyán has carried out and leaded research in various international research projects. Besides research, he has been teaching courses on network security and electronic commerce in the MSc programme at BUTE, and gave invited lectures at various places. He is also providing consulting services, and he has recently founded a spin-off called Tresorit with some of his students. Security and Privacy are crucial issues for citizens and customers using IT-based systems. The specialisation focuses on the general ideas, techniques and methods of Applied Cryptography as well as on the theoretical background and solid knowledge, putting security in a wider context. Security and Privacy is considered both from the technological and from the economical point of view, which supports decisions in many practical cases. Applied cryptography serves as a base for most of the secure IT-systems (e.g. in Future Media and Content Delivery, Smart Spaces, Digital cities, Health and ICT-Mediated Human Activity, and Enabling the Internet of the Future).
10 Graduates are able to manage all the typical cryptographic challenges in IT-Systems, able to develop cryptosystems under various circumstances, aware of the theoretical and practical background, and offered internships at our partner IT companies and research institutes. Contact: Peter Sziklai + Levente Buttyán Advanced Cryptography Specialisation Mandatory Courses (24 ECTS): Advanced Cryptography Cryptography and its Applications Cryptographic Protocols Economics of Security and Privacy Advanced Cryptography Specialisation Electives: Applied Cryptography Project Seminar
11 Information Security and Privacy (Saarland University) Prof. Michael Backes is the coordinator of the Security and Privacy programme at Saarland University, Germany. He is a full professor at the Department of Computer Science and leads the Center for IT-Security, Privacy and Accountability (CISPA) located at Saarland University. In addition, he founded a spin-off company called Backes:SRT that develops technologies to improve data protection in secure communication. Furthermore, he is supervising 10 graduate students which are highly involved in teaching and advising bachelor s and master s theses. Christian Hammer is an assistant professor at CISPA, Saarland University and is the faculty contact for the Security and Privacy programme at this node. His research interests includes systems security, in particular for the andriod platform, and web security in the context of javascript. His research on security for programming languages centers around information flow control techniques, that control where secret infromation is allowed to be used. He also collaborates with IBM Research to investigate secure multicore programming. The Information Security and Privacy specialisation connects provably secure and privacypreserving concepts with practically deployable applications. This area offers many possible directions for the students such as Android Security, Web Security, or Synthesis of Distributed Applications, to name a few. Working on these concrete domains, the student learns how to use complex cryptographic primitives as well as information flow analyses in order to guarantee privacy of software systems. In the last 6 months of their studies, students choose a topic for their master s thesis. The topic can be based on an idea of the student, or the student can approach a professor to suggest a topic tailored to the individual interest and previous knowledge of the student. For instance, a student interested in android security could contribute to AppGuard, which is an application allowing selective revocation of permissions on android. Contact: Michael Backes + Christian Hammer
12 Information Security and Privacy Specialisation Electives (34 ECTS): Information Security and Privacy Privacy Enhancing Technologies Formal Methods in Information Security and Privacy Practical Aspects of Information Security Seminar on Selected Topics in Information Security and Privacy 9 ECTS 7 ECTS
13 System Security (TU Darmstadt) Prof. Dr. Matthias Hollick is a full professor at TU Darmstadt, where he heads the Secure Mobile Networking Lab (SEEMOO), which is part of the Center for Advanced Security Research Darmstadt (CASED). His research interests lie in the areas of security, resiliency, and quality of service for mobile and wireless networks. Prof. Dr. Stefan Katzenbeisser is a full professor at TU Darmstadt, where he heads the Secureity Engineering Lab (SecEng). His main research interests are in the area of the design and analysis of cryptographic protocols, privacy-enahnaicng technologies, and software security. The system security specialisation emphasizes on the IT security aspects of large and complex networked systems such Smart Energy Systems, Digital Cities, the Future Internet, etc. It thus provides a direct link to the respective thematic areas of the EIT ICT Labs research and innovation agenda. These areas are characterized by an increasing complexity of the underlying ICT systems. More precisely, they comprise a multitude of software and hardware components, which in combination form complex ICT systems. IT security and privacy needs to acknowledge such complex ICT, and go beyond a narrow and specialized focus. With the system security specialisation, TU Darmstadt will equip the next generation of security researchers, entrepreneurs, and professionals with the necessary knowledge to master ICT security and privacy in a networked world. Contact: Matthias Hollick + Stefan Katzenbeisser Specialisation courses (the course catalogue varies for the 3 rd and 4 th term; courses marked with an asterisk (*) are generally offered in the summer term. I.e. they are available, if the students perform their final thesis already in the 3 rd term of the master programme).
14 System Security Specialisation Mandatory Courses (min. 2): Secure, Trusted and Trustworthy Computing Static and Dynamical Program Analysis * Operating Systems II: Dependability and Trust 8 ECTS * Privacy-Enhancing Technologies 3 ECTS Seminars/advanced seminars 3-4 ECTS System Security Specialisation Electives 3 rd Term: Security Requirements Engineering Cryptographic Pearls Post-quantum Cryptography Operating Systems Lab Exercises in System Security 4 ECTS 8 ECTS 3 - System Security Specialisation Electives 4 th Term: Security Requirements Engineering 4 ECTS * Secure Mobile Systems 3 ECTS * Embedded System Security * Cryptographic Protocols * Formal Methods in Information Security 9 ECTS Lab Exercises in System Security 3 -
15 Applied Security (University of Trento) Prof. Dr. Fabio Massacci received a M.Eng. in 1993 and Ph.D. in Computer Science and Engineering at University of Rome La Sapienza in He visited Cambridge University in and was visiting researcher at IRIT Toulouse in He joined the University of Siena as assistant professor in 1999, and in 2001 he became a full professor at the University of Trento.His research interests are in security requirements engineering and verification and load-time security for mobile and embedded systems (Securityby-Contract). He co-founded the ESSOS with W. Jousen, Engineering Secure Software and Systems Symposium, which aims at bringing together requirements, software engineers and security experts. He was leading the Empirical Security Requirements and Risk Engineering Challenge (ERISE). He has been a scientific coordinator of multimillion-euro EU projects on security compliance, security engineering and secure evolution. In many practical contexts such as Digital Cities or Smart Energy Systems, Security and Privacy are seen by IT vendors as additional costs which customers are not really willing to pay for. Even in the framework of cyber security low protection mechanisms might be chosen to save costs. The specialisation focuses on the challenge of guaranteeing the right level of security to an application that is substantiated by empirical evidence. Graduates are able to: identify the appropriate security technology that can be deployed develop appropriate solutions for the industry scenarios of cyber security and citizen s security describe and justify the benefits for such choices based on empirical results Contact: Fabio Massacci
16 Applied Security Specialisation Mandatory Courses (): Empirical Methods for Security Applied Security Specialisation Electives: Laboratory of Applied Cryptography Laboratory of Network and System Security Applied Formal Methods for Security
EIT ICT Labs MASTER SCHOOL. Specialisations
EIT ICT Labs MASTER SCHOOL Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The Learning outcomes of this major are: Understanding the concepts and technologies for achieving confidentiality,
More informationHow To Become A Computer Scientist
EIT Education & the EIT ICTLabs Master School Prof. Fabrizio Granelli Local Master School Coordinator, UNITN Education, EIT & UNITN Maurizio Marchese Fabrizio Granelli Director of Education Local MS coordinator
More informationEIT ICT Labs MASTER SCHOOL DSS Programme Specialisations
EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations DSS EIT ICT Labs Master Programme Distributed System and Services (Cloud Computing) The programme in Distributed Systems and Services focuses on
More information1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
More informationMaster s Programme in ICT Innovation
Master s Programme in ICT Innovation Degree Programme in Computer Science and Engineering Degree: Master of Science in Technology M.Sc. (Tech) 120 ECTS Majors: Digital Media Technology (xxxx) Distributed
More informationDeliverable D13.2 Report describing the curricula for a master in Security Engineering for Future Internet Services and the co-tutela program setup
Network of Excellence on Engineering Secure Future Internet Software Services and Systems Network of Excellence Deliverable D13.2 Report describing the curricula for a master in Engineering for Future
More informationComputer. Welcome to the Faculty of Electrical Engineering, Mathematics and Computer Science! master s degree
master s degree Computer Science Welcome to the Faculty of Electrical Engineering, Mathematics and Computer Science! For us the world is flat. Electrical Engineering, Mathematics and Computer Science have
More informationCYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group
1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is
More information11741 E-Business Credit Hours: 3 11752 Integrated Application Systems Credit Hours: 3 11742 Enterprise Systems Architecture Credit Hours: 3
11741 E-Business E-Business is radically changing the ways in which business organizations operate and compete in the global market. This course introduces students to various aspects and models for e-business.
More informationInformation Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
More informationEIT ICT Labs MASTER SCHOOL ITA Programme Specialisations
EIT ICT Labs MASTER SCHOOL ITA Programme Specialisations ITA EIT ICT Labs Master Programme Internet Technology and Architecture The programme in Internet Technology and Architectures focuses on studies
More informationHow To Teach Computer Science
EIT ICT Labs Master Programme Internet Technology and Architecture (ITA) The ITA master is a new European two-year master programme within the EIT master school ICT Innovation. The aim of the EIT (European
More informationEIT ICT Labs Education Systematic Approach to EIT Label. Prof. Dr.h.c Prof.h.c Hannu Tenhunen Education Director
EIT ICT Labs Education Systematic Approach to EIT Label Prof. Dr.h.c Prof.h.c Hannu Tenhunen Education Director Our Education Strategy aims at breeding and attracting top talents EIT ICT Labs Education
More informationSeminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
More informationResearch Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
More informationGLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
More informationSecurity and Privacy in Big Data, Blessing or Curse?
Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology
More informationDept. of Financial Information Security
Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators
More informationEIT ICT Labs The ICT Innovation Catalyst for Europe
Start-Chart EIT ICT Labs The ICT Innovation Catalyst for Europe Prof. Dr. Willem Jonker CEO willem.jonker@ictlabs.eu EIT ICT Labs mission is to turn Europe into a global leader in ICT Innovation Breed
More informationLe sfide per il Sistema della Ricerca Trentino nell ambito della gestione dell Identità Digitale
Le sfide per il Sistema della Ricerca Trentino nell ambito della gestione dell Identità Digitale Alessandro Armando Security & Trust Research Unit Fondazione Bruno Kessler Identità Digitale: il ruolo della
More informationNetwork Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and
More informationDepartment of Information Systems and Cyber Security
The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association
More informationOrientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS. Information Systems. Prof. Dr.
Orientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS Information Systems Prof. Dr. Stefan Lessmann Agenda What it is about Information Systems Who we are What
More informationIoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
More informationI m visualizing large datasets to generate
GRADUATE SCHOOL 2015-2016 I m visualizing large datasets to generate new insights Graduate program Computer Science * This major is formally part of the Computer Science & Engineering Bachelor program
More informationICT MASTER PROGRAMME for Information Security / Mobile Services
ICT MASTER PROGRAMME for Information Security / Mobile Services 14.3.2006 Murmansk Development Manager History and Background Founded 1969 as an independent department, joined Faculty of Science in 1987
More informationTUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
More informationApplied and Integrated Security. C. Eckert
Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass
More informationContents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions
Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces
More information2013-04-16 to 2013-04-19. Hanno Langweg, Einar Snekkenes (HiG)
COINS study tour 2013-04-16 to 2013-04-19. Hanno Langweg, Einar Snekkenes (HiG) Seven institutions were selected to collect their experience with Ph.D. training in security and computer science. The selection
More information2. Cyber security research in the Netherlands
2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed
More informationCyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
More informationAssociate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
More informationMaster of Science in Information Systems & Security Management. Courses Descriptions
Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course
More informationCentre for Entrepreneurship. Master of Science in. Innovation and. graduate
Centre for Entrepreneurship Master of Science in Innovation and Entrepreneurship graduate Prospectus WELCOME WELCOME Contents The University of Oslo Students currently studying at the Centre for Entrepreneurship
More informationCurrent and Future Research into Network Security Prof. Madjid Merabti
Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition
More informationNettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing
Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if
More informationEIT ICT Labs MASTER SCHOOL ES Programme Specialisations
EIT ICT Labs MASTER SCHOOL ES Programme Specialisations ES EIT ICT Labs Master Programme Embedded Systems The programme in Embedded Systems focuses on enabling technologies and design methodologies for
More informationIntroducing the EIT ICT Labs Budapest Associate Partner Group
Introducing the EIT ICT Labs Budapest Associate Partner Group Prof. Dr. Zoltán Horváth EIT ICT Labs Conference, Budapest 05 March, 2013 Contents The partners and the Co-location Centre National Development
More informationTelecommunication (120 ЕCTS)
Study program Faculty Cycle Software Engineering and Telecommunication (120 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program This master study
More informationAPPLIED AND INTEGRATED SECURITY
APPLIED AND INTEGRATED SECURITY Directors: Claudia Eckert (Managing) Georg Sigl SECURITY RESEARCH IN MUNICH Fraunhofer Institution for Applied and Integrated Security Claudia Eckert Georg Sigl TU München
More informationWELCOME to the MASTER in Computer Science and Communication Systems
Ecole Polytechnique Fédérale de Lausanne EPFL School of Computer and Communication Sciences IC 1 WELCOME to the MASTER in Computer Science and Communication Systems 2 1 TODAY S SPEAKERS Prof. Bernard Moret:
More informationIT Security in Industrie 4.0
IT Security in Industrie 4.0 Prof. Dr. Michael Waidner TU Darmstadt & Fraunhofer Institute for Secure Information Technology? AUTONOMIK Innovation Days Berlin, June 17-18, 2014 1. What is Industrial IT
More informationFuture cybersecurity threats and research needs.
www.thalesgroup.com Future cybersecurity threats and research needs. 3 rd Franco-American Workshop on Cybersecurity Lyon Kreshnik Musaraj kreshnik.musaraj@thalesgroup.com December 9. 2014 2 / Challenges
More informationIoT Potential Risks and Challenges
IoT Potential Risks and Challenges GRIFES / GITI / EPFL Alumni Conference, Lausanne, May 7 th, 2015 Stefan Schiller, HP ESP Fortify Solution Architect D/A/CH IoT Potential Risks and Challenges Agenda IDC
More informationThe Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
More informationTop Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
More informationEcole Polytechnique Fédérale de Lausanne EPFL School of Computer and Communication Sciences IC. School of Computer and Communication Sciences
Ecole Polytechnique Fédérale de Lausanne EPFL School of Computer and Communication Sciences IC 1 WELCOME to the MASTER in Computer Science and Communication Systems 2 TODAY S SPEAKERS Prof. Paolo Ienne:
More information3TU Master of Science in Systems and Control. An essential engineering qualification for future decades
3TU Master of Science in Systems and Control An essential engineering qualification for future decades The challenge of Systems and Control As the complexity and importance of our many industrial structures
More informationCyber Security in the University of Oxford: Collaborating without Conforming?
Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity
More informationMaster s Programme in Service Design and Engineering 2010-12
Master s Programme in Service Design and Engineering 2010-12 Degree Programme of Computer Science and Engineering Degree: Master of Science in Technology M.Sc. (Tech) 120 ECTS Major: Service Design and
More informationTowards Trustworthy Clouds
IBM Research Zurich Christian Cachin 12 September 2013 Towards Trustworthy Clouds 2009 IBM Corporation Cloud computing? 2 Cloud services are convenient No investment cost Pay only for consumption Scalable
More informationMEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
More informationfuture data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
More informationMaster of Science in Business Administration
BRUSSELS t Master of Science in Business Administration Majors: International Business Management Business Information Management International Relations Faculty of Economics and Business Campus Brussels
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationCenter of Academic Excellence Cyber Operations Program 2013 Application
Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department
More informationMasters in Applied Cyber Security Upskilling Existing Employees
Masters in Applied Cyber Security Upskilling Existing Employees Origination The Masters in Applied Cyber Security (MACS) emerged from discussions at the Steering Group of ICT Ireland Skillnet where companies
More informationCyber Security Review
ISSN 2055-6950 (Print) ISSN 2055-6969 (Online) Cyber Security Review Winter 2014/15 CYBERCRIME AS A NATIONAL SECURITY ISSUE CECSP: TOWARDS EFFECTIVE COLLABORATION ON CYBER SECURITY IN CENTRAL EUROPE TECHNICAL
More informationEuropean Network for Cyber Security
European Network for Cyber Security Cyber Security: a fundamental basis for Smart Grids Project Summary December 19, 2014 Introduction Smart grids are crucial to support the use of more sustainable energy
More informationHardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
More informationMASTER OF SCIENCE (MSc) IN ENGINEERING (SOFTWARE ENGINEERING) (Civilingeniør, Cand. Polyt. i Software Engineering)
Chapter 9 The programme specific part of the curriculum for: MASTER OF SCIENCE (MSc) IN ENGINEERING (SOFTWARE ENGINEERING) (Civilingeniør, Cand. Polyt. i Software Engineering) Applicable to students admitted
More informationQF01/0407-1.0 الخطة الدراسية كلية العلوم وتكنولوجيا المعلومات- برنامج الماجستير/ الوصف المختصر
Algorithms analysis and design(0102721). The course introduces students to a variety of computer problems and methods of their solutions. It enables students to assess the complexity of problems and algorithms.
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationRemote 2014 Monitoring & Control. Securing Mobile Devices November 7 th 2014
Remote 2014 Monitoring & Control Securing Mobile Devices November 7 th 2014 Purpose / Agenda Ken Lewis, CISSP Director of Cross Domain Security Solutions for Tresys Technology Systems Security Engineer
More informationSmart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
More informationNETWORKING COURSES @ UNITN. Fabrizio Granelli Networking area coordinator granelli@disi.unitn.it
NETWORKING COURSES @ UNITN Fabrizio Granelli Networking area coordinator granelli@disi.unitn.it Networking specialization Prof. F. Granelli Wireless networks: Architecture, protocols and performance: WiFi
More informationCS 464/564 Networked Systems Security SYLLABUS
CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor
More informationDigital Signatures and Interoperability
Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000
More informationNokia Networks. security you can rely on
Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
More informationCloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
More informationInformation Security and Cryptography
Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00
More informationImplementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean advisor: Panos Papadimitratos January 2009 Abstract Vehicular Ad-hoc Networks (VANETs)
More informationThe University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research
The University of Alabama Cyber Research Initiatives Cyber Forensics Research Cyber Security Research Cyber Forensics Research Department of Criminal Justice College of Arts and Sciences Cyber Crime Research
More informationEnabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
More informationInternet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges
More informationMasters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
More informationMSc Cyber Security. identity. hacker. virus. network. information
identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through
More informationMasters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
More informationMasters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
More informationSecurity Certification of Third- Parties Applications
Security Certification of Third- Parties Applications Stanislav Dashevskyi dashevskyi@fbk.eu Advisors: Fabio Massacci, Antonino Sabetta Agenda Introduction Third-party code in web applications Third-party
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationMasters in Computing and Information Technology
Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits
More informationMASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationThe Danish Cyber and Information Security Strategy
February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives
More informationMasters in Networks and Distributed Systems
Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to
More informationSecure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing
Secure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing Prof. Dr. Ahmad-Reza Sadeghi TU Darmstadt Academic Principal Investigator and Director Dr. Matthias Schunter
More informationHow To Build A Provably Secure Execution Platform For Embedded Systems
Provably Secure Execution Platforms for Embedded Systems ---- The PROSPER Project Mads Dam KTH Royal Institute of Technology Programvara för konkurrenskraft, SSF, Vinnova, 10 Feb 2015 The Evolving Security
More informationTrust areas: a security paradigm for the Future Internet
Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de
More informationA SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
More informationResilient Networks. 00. Preliminaries. Who is who. Organizational Issues. P2P, TK What do we do. Exercise course Rough time line Examination
Resilient Networks 00. Preliminaries Who is who P2P, TK What do we do Organizational Issues Exercise course Rough time line Examination 23.04.2013 Fachbereich Informatik P2P Group and Telecooperation Group
More informationOverview TECHIS60441. Carry out security testing activities
Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being
More informationCertification of Master s Degrees Providing a General Broad Foundation in Cyber Security
OFFICIAL Certified Master s Briefing Meeting 14 April 2014 Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security Chris Ensor Michael Kirton Ellie England Graeme Dykes
More informationWireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
More informationPlease consult the Department of Engineering about the Computer Engineering Emphasis.
COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals
More informationMicrosoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
More informationWhat is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
More informationSecurity Issues in SCADA Networks
Security Issues in SCADA Networks by V. M. Igure, S. A. Laughter, and R. D. Williams Computers & Security, 25(7): 498-506, 2006 presented by Ruilong Deng Postdoctoral Research Fellow School of Electrical
More informationMaster of Communication Studies New Media and Society in Europe
Master of Communication Studies New Media and Society in Europe A one-year programme in English focusing on one of the most dynamic sectors in Europe. Master of Communication Studies The Master of Communication
More information