Page Areas:



Current Submenu:

Additional Information:

FAW @ Lange Nacht der Forschung 2016

Lange Nacht der Forschung 2016

Campus map

Campusplan JKU Linz

Our location on campus ...  more of Campus map (Titel)

Softwarepark Hagenberg

Hier den Alternativtext zum Bild eingeben!

Our location on Softwarepark Hagenberg ...  more of Softwarepark Hagenberg (Titel)


Position Indication:

Content

Security Models in Information Systems

Lecturers: A. Univ.-Prof. Dr. Josef Küng, Dr. Erik Sonnleitner
 
Registration via KUSSS.

Goal

Appropriate implementation of security in Information Systems must ensure the interest of the user and other affected persons in terms of Availability, Confidentiality, Anonymity and Integrity. Therefor Access- Data Flow and Inference-Control are crucial. Goal of the lecture is to communicate models, concepts and architectures that support such an appropriate implementation of security in Information Systems.

Content

The lecture starts with Architecture of Information Systems with a focus on security relevant parts. Secondly, the most important models and concepts for security in Information Systems are presented. Then techniques for hardening database systems and information systems are introduced. Additionally data anonymity and watermarking in databases will be touched.

Homework

Students have to fulfil a small particular task in the area of security in information systems and present the results. Homework can be done in groups up to 3 persons.
The presentation should take 15-20 minutes. Presentation material (e.g. slides, screen dumps, … ) has to be sent to the lecturer via e-mail by the day before the presentation . The presentation can be done in German as well.

Final Examination

It is a written examination and will take 60 minutes. Students have to bring their own blank paper.
 
No documents (like course documents, books, personal notes, etc.) or any other external information are permitted.
 
Questions will be formulated in German and English and can be answered in one of these two languages.
 
Since there have been no slides uploaded for chapter ‘Authentication’, this chapter will not be used in the examination. Only the documents, which are available in KUSSS since the last lecture (June 2) are subject of the examination.