Information & Communication Security
Basic Information
Type of Lecture: | Lecture with Exercise |
---|---|
Course: | Master |
Hours/Week: | 2 |
Credit Points: | 6 |
Language: | English |
Term: | Summer 2020 |
Lecturers: | |
Email: |
Content of the Course
Description:
Information about the Q&A lecture: Please send us your questions for the last lecture (Q&A) until July, 5th.
Attention 1: Since there were numerous successful tests with the conference tool BigBlueButton, we will also use it in Information Security, starting on May, 19. Here is the link: BigBlueButton conference portal.
Attention 2: As our interactive offers have only limited capacity, please send us an email to
Attention 3: Taking into account the current situation due to SARS-CoV-2 we currently assume that all lectures will be streamed live. We will use OLAT as a platform for students to ask questions during the live streams of the lectures. All other information, news, and teaching materials can be found at this website. The OLAT forum can be accessed via the following link:
https://olat-ce.server.uni-frankfurt.de/olat/auth/RepositoryEntry/8186036328?1.
Important Note:
Auf Grund der gegebenen Situation können wir aktuell noch keine rechtssicheren Aussagen darüber treffen, in welcher Form schriftliche Prüfungen im Sommersemester 2020 abgenommen werden. Natürlich hoffen wir darauf, dass sich die allgemeine Lage bis zum Juli wieder so entspannt, dass Präsenzprüfungen an der Universität möglich sein werden. Wir sind hier in ständiger Kommunikation mit dem Präsidium und werden Sie umgehend informieren, sobald die Goethe-Universität hier verbindliche Entscheidungen trifft. Dies kann in Anbetracht der Lage auch recht kurzfristig geschehen und wir bitten Sie hierfür um Verständnis. Den jeweils aktuellen Stand der Universitätsregelungen zu Studium und Prüfungen finden Sie unter:
https://www.uni-frankfurt.de/86555546/Corona?legacy_request=1
The "Information and Communication Security" lecture series provides a general introduction to the topic of information and communication security. Students will be qualified to identify security challenges that come along with using and employing information and communication systems, and to identify and apply adequate means and methods to solve them. Emphasis will be put on the organizational and technical set-up of infrastructures, also including aspects of pragmatic and professional risk management, and profitability analysis of security concepts and technologies. Further, students will be qualified to identify and assess security risks, in order to develop and establish appropriate security strategies. Contents presented in the lecture will also be discussed in the context of international standardization and regulation activities in the domain of information and communication security, allowing students to consider long-term developments, trends, and challenges in their analysis.
Agenda:
Date | Time | Session | Title | Downloads | Stream |
21.04.20 | 10:00-12:00 | Lecture 1 | Introduction | L01_Introduction | L01_Zoom |
28.04.20 | 10:00-12:00 | Lecture 2 | Authentication | L02_Authentication | L02_Link |
28.04.20 | 16:00-18:00 | Lecture 3 | Cryptography I | L03_Cryptography_I_V1.1 | L03_Link |
05.05.20 | 10:00-12:00 | Exercise 1 | Authentication | E01_Authentication Solution |
E01_Zoom |
12.05.20 | 10:00-12:00 | Lecture 4 | Cryptography II | L04_Cryptography_II_V1.2 | L04_Link, OLAT |
12.05.20 | 16:00-18:00 | Lecture 5 | Access Control | L05_Access_Control | L05_Link, OLAT |
19.05.20 | 10:00-12:00 | Lecture 6 | Electronic Signatures | L06_Electronic_Signatures_V1.1 | L06_Link_BBB |
26.05.20 | 10:00-12:00 | Exercise 2 | Cryptography | E02_Cryptography_V1.1, Solution | E02_BBB |
26.05.20 | 16:00-18:00 | Exercise 3 | Access Control |
Solution |
E03 BBB |
02.06.20 | 10:00-12:00 | Lecture 7 | Identity Management | L07_Identity_Management_V1.4 | L07_Link_BBB |
09.06.20 | 10:00-12:00 | Lecture 8 | Privacy Protection I | L08_Privacy_Protection_I_V1.3 | L08_Link_BBB |
09.06.20 | 16:00-18:00 | Lecture 9 | Privacy Protection II | User Aspects of PETs L09_Privacy_Protection_II_V1.2 |
L09_Link_BBB |
16.06.20 | 10:00-12:00 | Lecture 10 | Computer System Security | L10_Computern_System_Security | L10_Link_BBB |
23.06.20 | 10:00-12:00 | Guest Lecture 1 | Biometrics | G01_Biometrics | GL1_Link_BBB |
23.06.20 | 16:00-18:00 | Exercise 4 | Security Management | E04_Security Management | E04_Link_BBB |
30.06.20 | 10:00-12:00 | Guest Lecture 2 | Social Engineering |
In order to further enhance the quality of the game and to draw conclusions on its efficiency, we ask users of PROTECT to provide some feedback and background information, e.g. on previous knowledge.
The questionnaire will take approximately 15 minutes to answer.
Link to the survey:
|
GL2_Link_BBB |
07.07.20 | 10:00-12:00 | Lecture 11 | Network Security I | L11_Network_Security_I | L11_Link_BBB |
07.07.20 | 16:00-18:00 | Lecture 12 | Network Security II | L12_Network_Security_II | L12_Link_BBB |
14.07.20 | 10:00-12:00 | Lecture 13 | Exam Prep and Wrap Up | L13_Link_BBB |
Exam
Information:
Information & Communication Security
Basic Information
Type of Lecture: | Lecture |
---|---|
Course: | Master |
Hours/Week: | 3 |
Credit Points: | 6 |
Language: | English |
Term: | Winter 2020/2021 |
Lecturers: | |
Email: |
Content of the Course
Description:
Lectures and exercises are streamed live at BigBlueButton.
Link: https://bbb.tbm.tudelft.nl/b/aha-rgy-r6z-0y6
The "Information and Communication Security" lecture series provides a general introduction to the topic of information and communication security. Students will be qualified to identify security challenges that come along with using and employing information and communication systems, and to identify and apply adequate means and methods to solve them. Emphasis will be put on the organizational and technical set-up of infrastructures, also including aspects of pragmatic and professional risk management, and profitability analysis of security concepts and technologies. Further, students will be qualified to identify and assess security risks, in order to develop and establish appropriate security strategies. Contents presented in the lecture will also be discussed in the context of international standardization and regulation activities in the domain of information and communication security, allowing students to consider long-term developments, trends, and challenges in their analysis.
Agenda:
Date | Time | Session | Title | Downloads | Stream |
03.11.2020 | 10:00-12:00 | Lecture 1 | Introduction | 01_Introduction_v1.2 | bbb_R1 |
10.11.2020 | 10:00-12:00 | Lecture 2 | Authentication | 02_Authentication | bbb_R1 |
10.11.2020 | 16:00-18:00 | Lecture 3 | Cryptography I | 03_Cryptography_I | bbb_R1 |
17.11.2020 | 10:00-12:00 | Lecture 4 | Cryptography II | 04_Cyptography_II | bbb_R1 |
24.11.2020 | 10:00-12:00 | Exercise 1 | Authentication | bbb_R1 | |
24.11.2020 | 16:00-18:00 | Exercise 2 | Cryptography | bbb_R1 | |
01.12.2020 | 10:00-12:00 | Lecture 5 | Access Control | 05_Access_Control | bbb_R2 |
08.12.2020 | 10:00-12:00 | Exercise 3 | Access Control | bbb_R2 |
|
08.12.2020 | 16:00-18:00 | Lecture 6 | Electronic Signatures | 06_Electronic_Signatures | bbb_R2 |
15.12.2020 | 10:00-12:00 | Lecture 7 | Identity Management | 07 Identity Management | bbb_R2 |
12.01.2021 | 10:00-12:00 | Lecture 8 | Privacy Protection I | 08_Privacy_Protection_I_v1.1 | bbb_R2 |
19.01.2021 | 10:00-12:00 | Guest Lecture 1 | Security Management | G01_Security_Management_v1.1 | bbb_R2 |
19.01.2021 | 16:00-18:00 | Exercise 4 | Security Management | E4_Security_Management_v1.1 | bbb_R2 |
26.01.2021 | 10:00-12:00 | Lecture 9 | Privacy Protection II | 09_Privacy_Protection_II | bbb_R2 |
02.02.2021 | 10:00-12:00 | Lecture 10 | Computer System Security | 10_Computer_System_Security | bbb_R2 |
02.02.2021 | 16:00-18:00 | Guest Lecture 2 | Biometrics | GL2_Biometrics | bbb_R2 |
09.02.2021 | 10:00-12:00 | Lecture 11 | Network Security I | 11_Network Security_I | bbb_R2 |
16.02.2021 | 10:00-12:00 | Lecture 12 | Network Security II | 12_Network_Security_II | bbb_R2 |
16.02.2021 | 16:00-18:00 | Lecture 13 | Exam Prep and Wrap Up | bbb_R2 |
Exam
Information:
Exam Review (29.03.2021 13:00-15:00 HZ3)
-
-
-
- Please find information regarding exam reviews here: https://www.wiwi.uni-frankfurt.de/studium/studierende/pruefungsorganisation/pruefungen/klausur-einsichtstermine/einsichtstermine-master.html
- Registration mandatory
- Please bring the signed Unterweisungsnachweis Teilnehmer*innen and your student ID to the exam review.
- Registration by e-mail with the subject "Registration Exam Review INKO [matriculation number]" to
This email address is being protected from spambots. You need JavaScript enabled to view it. until 26.03.2021, 12:00. After the registration deadline, you will be assigned a slot in the above mentioned period and will receive further instructions by e-mail.
-
-
Exam
Up to our current knowledge the exam will take place in the university. Please keep yourself up to date on the website of the examination office and read the information of the examination office carefully:
- https://www.wiwi.uni-frankfurt.de/fileadmin/user_upload/dateien_pruefungsamt/Pruefungsorganisation/Verhaltensregeln_20202.pdf
- https://www.wiwi.uni-frankfurt.de/en/news-examination-office/individual-view/article/information-about-written-exams-on-site-wise-202021-rules-of-conduct-and-procedure-information.html
No extra materials are allowed. The exam can be solved without a calculator.
The language of the exam is english. The exam is also to be answered in English.
Mobile Business I - Technology, Markets, Platforms, and Business Models
Basic Information
Type of Lecture: | Lecture |
---|---|
Course: | Master |
Hours/Week: | 3 |
Credit Points: | 6 |
Language: | English |
Term: | Winter 2020/2021 |
Lecturers: | |
Email: |
Content of the Course
Description:
Lectures and exercises are streamed live at BigBlueButton.
Link: https://bbb.tbm.tudelft.nl/b/dav-gss-8da-vib
The "Mobile Business" lecture series provides an introduction to technologies and economic principles defining these markets. Students will be qualified to identify success factors of mobile business models and to judge on possible application scenarios. Starting with the basics of mobile communication services, emphasis will be put on an analysis of the interaction between individuals and mobile devices / services.
This includes an historic overview across the development of mobile communication infrastructures, services, and protocols. Based on this, students will be qualified to identify possibilities and limitations of mobile business applications and business models, in order to consider the resulting opportunities and challenges when deriving the success factors. Characteristic attributes of mobile services, especially in contrast to electronic services, will be outlined and considered in an analysis of the current market environment for mobile business applications. Furthermore, traditional as well as emerging business models will be discussed. The course concludes with a presentation and discussion of several exemplary application scenarios. Students will be able to reflect on specific attributes of mobile applications, to analyse new scenarios, and to draw connections to traditional and established scenarios.
Agenda:
Date | Time | Type | No. | Title | Slides |
03.11.20 | 14-16 | Lecture | VL1 | Introduction to Mobile Business I | Download Updated |
03.11.20 | 16-18 | Lecture | VL2 | Mobile Telecommunication Infrastructures | Download |
10.11.20 | 14-16 | Lecture | VL3 | Wireless Internet-oriented Infrastructures and Protocols | Download |
17.11.20 | 14-16 | Lecture | VL4 | Mobile Communication Services | Download |
17.11.20 | 16-18 | Lecture | VL5 | E-Business vs. M-Business | Download |
24.11.20 | 14-16 | Exercise | E01 | Technology Basics I - VL02-04 | |
01.12.20 | 14-16 | Lecture | VL6 | Market Structure and Value Chain | Download |
01.12.20 | 16-18 | Lecture | VL7 | Business Models | Download |
08.12.20 | 14-16 | Exercise | E02 | Economics Basics I - VL05-07 | |
15.12.20 | 14-16 | Lecture | VL8 | Smartcards and Infrastructures | Download Updated |
15.12.20 | 16-18 | Lecture | VL9 | Mobile Devices | Download |
12.01.21 | 14-16 | Lecture | VL10 | Concepts of Mobile OS | Download |
12.01.21 | 16-18 | Lecture | VL11 | Mobile OS and Security Aspects - Examples | Download |
19.01.21 | 14-16 | Exercise | E03 | Technology Basics II - VL08-10 | |
26.01.21 | 14-16 | Lecture | VL12 | Trusted Devices | Download |
26.01.21 | 16-18 | Lecture | VL13 | Acceptance and Success Factors in Mobile Business | Download |
02.02.21 | 14-16 | Guest Lecture | GL01 | Guest Lecture by Anne Grünkorn | Download |
09.02.21 | 14-16 | Exercise | E04 | Economics Basics II - VL11-13 | Download |
09.02.21 | 16-18 | Exercise | E05 | Conducting User Studies in Information Systems and Computer Science (by David Harborth) | |
16.02.21 | 14-16 | Lecture | VL14 | Current Research / Q&A |
Exam
Information:
Towards Central Bank Digital Currency (CBDC)
Basic Information
Type of Lecture: | Lecture |
---|---|
Course: | Bachelor |
Hours/Week: | 2 |
Credit Points: | 8 |
Language: | English |
Term: | Winter 2020/2021 |
Lecturers: | |
Email:
|
Content of the Course
Description
Module description
Since the introduction of Bitcoin through Nakamoto in 2008, the topic of cryptocurrencies has steadily gained in importance in public discourse. Cryptocurrencies, created with the intention to act as a store of value, medium of exchange or unit of account, offer the possibility to act as substitutes to cash and traditional methods of payment for individuals.
With the rise in market capitalization and organizations like Facebook planning to introduce their own cryptocurrencies, the question of if and how central banks should react to this development has naturally arisen given their role in managing money supply for the whole economy. Hereby, the use of blockchain, or distributed ledger technology (DLT) are only two possible options to technically implement a CBDC.
In countries like Sweden and Uruguay, the introduction of a Central Bank Digital Currency (CBDC) – a digital form of legal tender provided by a central bank – is already being discussed and piloted. Sweden for instance is working on an eKrona project (Skingsley 2016). Uruguay has already finished its e-Peso pilot project successfully with voluntary participants (Bergara and Ponce 2018). In Oktober 2020 the European Central Bank (ECB) has issued new work on the digital Euro and is intensifying its reasearch into such a new type of currency.
This seminar aims to introduce students to the topic of CBDC. Students will be working individually or in groups on various topics on the subject and may apply theoretical as well as empirical research methodologies like systematic literature reviews or quantitative user studies.
The aim is to gather legal, technical, economical and societal insights on the topic to gain a thorough understanding on the consequences that the introduction of a CBDC might have in the future.
Topics:
- Stakeholder Analysis of CBDC
- Comparison of Stablecoins and CBDC
- Privacy and anonymity in CBDC
- Usage adoption of CBDC from individuals.
- Literature review on CBDC pilot projects of central banks
- Technology and features of a CBDC
- Monetary aspects of CBDC
- Legal Analysis on CBDC
- Trust in money
-
-
-
-
- Other: Literature review on cryptocurrencies in information systems
- Other: Feel free to come up with your own ideas regarding CBDC or a digital Euro
-
-
-
Please find more information on the particular topics on the following slides: CBDC Topics
Learning goals and Competency
-
-
-
-
- Ability to understand and perform a systematic literature review (LGB-1)
- Basic understanding of privacy assessment methods and CBDC (LGB-3)
- Demonstrate good writing and presentation skills (LGB-7)
- Demonstrate good organisational skills and collaboration in working in groups (LGB-6)
- Perform empirical and quantitative research in order to understand DBCD stakeholder expectation and concerns (LGB-2)
-
-
-
1) Methodology
-
-
-
-
- vom Brocke, J., Simons, A., Riemer, K., Niehaves, B., Plattfaut, R., & Cleven, A. (2015). Standing on the shoulders of giants: Challenges and recommendations of literature search in Information Systems research. Communications of the Association for Information Systems, 37(1), Article 9, 205-224.
- vom Brocke, J., Simons, A., Niehaves, B., Riemer, K., Plattfaut, R., & Cleven, A. (2009). Reconstructing the Giant: On the Importance of Rigour in Documenting the Literature Search Process. In ECIS 2009 Proceedings (pp. 2206–2217).
- Recker, J. (2012). Scientific Research in Information Systems: A Beginner’s Guide. http://doi.org/10.1007/978-3-642-30048-6
-
-
-
2) Topics
-
-
-
-
- CBDC: Tronnier, F., Recker, M., Hamm, P. (2020). Towards Central Bank Digital Currency – A Systematic Literature Review
- Stablecoins: Mita, M., Ito, K., Ohsawa, S., & Tanaka, H. (2019). What is Stablecoin?: A Survey on Price Stabilization Mechanisms for Decentralized Payment Systems. arXiv preprint arXiv:1906.06037.
- Privacy: Smith, H. J., Dinev, T., & Xu, H. (2011). Theory and Review Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989–1015.
-
-
-
Seminar presentations:.
- 25. - (28.01.2020) - 10:00 - 17:00
Student presentations on the topics chosen at the Kick-Off meeting. - Grades: 30% presentations, 70% papers
All information and instructions were handed out via mail
Seminar paper submission:
- ~10-15 pages per student
- Use the template on Theses, but with citations formatted using the APA style
- Every group should be able to point out which group member contributed to which parts of the paper, if requested.
- Deadline for submission: 22.01.2018, 10am
- Send the digital version to frederic.tronnier@m- chair.de
- A printed copy is not necessary!
Exam
Information:
Dear students, due to the new rules of the examination office, the eExam has been cancelled!
The new weighting of seminar papr and presentation is: Seminar paper grading (70%) and presentation (30).
If you already want to prepare for the seminar and the Kick-Off meeting, please contact me directly (
Best,
Frédéric Tronnier
Privacy Preserving Machine Learning
Basic Information
Type of Lecture: | Lecture |
---|---|
Course: | Master |
Hours/Week: | 2 |
Credit Points: | 6 |
Language: | German |
Term: | Summer 2021 |
Lecturers: | |
Email:
|
Content of the Course
Description
UPDATE: Due to the current COVID-19 situation, we have decided to have the seminar kick-off and the presentations online. Presentations will only take place on June 11th.
Although the applications of machine learning seem to be endless, many countries restrict and regulate the handling and usage of personal data by data protection regulations such as the EU GDPR. Many companies still struggle with the implementation and maintenance of EU GDPR conform data handling. Especially in conservative markets the usage of complex models or even the storage of related data is obviated. The biggest challenge at present is to meet the requirements of the data protection regulations while opening up new markets at the same time. Therefore, a variety of new technologies that enable privacy preserving machine learning have emerged during the recent years. These techniques aim to protect machine learning models from a variety of attacks that try to reveal data, training features, or the algorithm itself.
The objective of this seminar is to perform an extensive analysis of the state of the art in which privacy threats and the implementation of counter-measures will be analysed.
-
-
-
-
- Fredrikson, M., Jha, S., & Ristenpart, T. (2015, October). Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 1322-1333).
- Shokri, R., Stronati, M., Song, C., & Shmatikov, V. (2017, May). Membership inference attacks against machine learning models. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 3-18). IEEE.
- Su, J., Vargas, D. V., & Sakurai, K. (2019). One pixel attack for fooling deep neural networks. IEEE Transactions on Evolutionary Computation, 23(5), 828-841.
- Al-Rubaie, M., & Chang, J. M. (2019). Privacy-preserving machine learning: Threats and solutions. IEEE Security & Privacy, 17(2), 49-58.
-
-
-
Date | Time | Type | Files | Room |
---|---|---|---|---|
29.04.21 | 09:00 - 17:30 | Kick-Off Meeting (online) | Introduction,Introduction, Template |
https://bbb.uni-frankfurt.de/b/sas-bbk-kel-g06 |
11.06.21 | 09:00 - 14:00 | Presentations (online) | Agenda | https://bbb.uni-frankfurt.de/b/sas-bbk-kel-g06 |
Registration:
This module is limited to 20 participants.
A two-stage registration procedure with different deadlines applies. You have to take part in both stages!
Stage 1: Application Deadline: 22 March 2021 – 6 April 2021
Module Application via QIS: My Functions > Lectures occupy/sign off (Instruction Module Application)
Stage 2: Exam Registration and Withdrawal Deadline: 8 April 2021 – 21 April 2021
Exam Registration and Withdrawal via QIS: My Functions > Administration of exams (Instruction Exam Registration)
An acceptance in the application procedure entitles students to register for the allocated module, but it does not replace an exam registration. Without an exam registration in stage 2, the allocated module claim of the module application in stage 1 expires!
Assignment of Available Capacities: 22 April 2021 by e-mail. Detailed information will be published on this website in due time.
For exchange students, module application as well as exam registration and withdrawal is not possible via QIS. Exchange students register or withdraw with a form within the exam registration and withdrawal deadline (not application deadline!). Forms and information are available at the Website of the Faculty's International Office.
Exam
Information:
In order to successfully pass this module, you need to write a paper (60%) and make a presentation (40%). Each partial requirement needs to be passed with a grade of 4.0 or better.
Topics are in the area of:
- Privacy preserving machine learning in the smartphone ecosystem
- Privacy preserving machine learning in the car industry
- Economic incentives for privacy preserving machine learning
- Privacy preserving federated learning
- Privacy preserving differential privacy
Specific topics will be provided during the kick-off session. The methodologies will be presented and discussed in the group before the allocation of the topics.
Students are still required to work through the methodology of their topic carefully.
Alternative forms of examinations and other exceptions are only approved for the SoSe 2020 and WiSe 2020/21 so far. Therefore, we can initially only plan with the applicable regulations of our examination regulations. As soon as the University decides on different exceptions for the SoSe 2021 (probably in March/April 2021), the Examination Office will publish prepared information.
Due to the events, please keep up to date. Please find latest information of the Examination Office on this website Website https://www.wiwi.uni-frankfurt.de/pruefungsamt-aktuelles and via Examination Office News. We recommend subscribing to the Examination Office News (http://goethe.link/NewsAbo).