Selected Chapters of IT Security: Orchestration of Mechanisms and Tools
Winter
(engl. Selected Chapters of IT Security: Orchestration of Mechanisms and Tools )
Modulnummer: FIN-INF-120505 |
| Link zum LSF: | LSF |
| Verantwortung: | Prof. Dr. Jana Dittmann |
| Dozent:in: | Prof. Dr. Jana Dittmann |
| Lehrveranstaltungen: | Projekt Selected Chapters of IT-Security |
| Verwendbarkeit: | - M.Sc. INF: Informatik - M.Sc. INF: Schlüssel- und Methodenkompetenzen - M.Sc. INGINF: Informatik - M.Sc. INGINF: Schlüssel- und Methodenkompetenzen - M.Sc. WIF: Informatik - M.Sc. WIF: Schlüssel- und Methodenkompetenzen - M.Sc. DKE: Applied Data Science - M.Sc. DE: Methoden der Informatik - M.Sc. DE: Fachliche Spezialisierung - M.Sc. VC: Computer Science - M.Sc. VC: Schlüssel- und Methodenkompetenzen |
|
Kürzel ITSEC-Orch |
CP 6 |
Semester Winter |
Fachsem. None |
Dauer 1 Semester |
Sprache deutsch |
Niveau Master |
Angestrebte Lernergebnisse:
The students ...
- know and understand aspects of orchestration
- are able to independently deal with selected research questions of orchestration
- can evaluate existing approaches and creatively expand them for a research question
- can familiarize themselves with the semester-specific use case and reflect on it in a team
- can identify new approaches to orchestration for the research question
- can identify security requirements for the semester-specific use case and propose alternatives for improvement
- can implement, evaluate and assess a selected solution and identify residual risks
- can independently apply scientific methods of IT security
- can present the results scientifically in a presentation and take part in a discussion
- can recognize, reflect on and tackle challenges in teamwork
Inhalt:
Content on current challenges and solutions in IT security with selected questions of orchestration as a technical and organisational design task, from topics such as:
- Security management Standardization,
- Certification and evaluation Technical design against the backdrop of legal expectations
- Ethical and social aspects of IT security including sustainability, digital inclusion and accessibility
- Security in e-business
- Case studies on IT security
Arbeitsaufwand:
- 28 h attendance time
- 152 h independent work
| Prüfungsvorleistungen: | Studien-/Prüfungsleistungen: | Lehrform / SWS: |
|
Report
The presentation comprises an independent and in-depth written examination of a question from the context of the course, including and targeted critical evaluation of relevant literature, as well as the presentation of one's own work, also in comparison in a team, and the communication and evaluation of one's own results in an oral presentation and in the subsequent discussion in the team.
The work must be submitted in writing.
|
Research project (2 SWS)
|
| Voraussetzungen nach Prüfungsordnung: | Empfohlene Voraussetzungen: |
|
None
|
|
| Medienformen: | Literatur: |
|
|
|
Hinweise:
https://omen.cs.uni-magdeburg.de/itiamsl/deutsch/lehre/index.html