Module Handbook

  • Dynamischer Default-Fachbereich geändert auf INF

Module INF-42-82-M-7

Design of Secure Distributed Systems (Project) (M, 8.0 LP)

Module Identification

Module Number Module Name CP (Effort)
INF-42-82-M-7 Design of Secure Distributed Systems (Project) 8.0 CP (240 h)

Basedata

CP, Effort 8.0 CP = 240 h
Position of the semester 1 Sem. irreg.
Level [7] Master (Advanced)
Language [EN] English
Module Manager
Lecturers
Area of study [INF-VVS] Distributed and Networked Systems
Reference course of study [INF-88.79-SG] M.Sc. Computer Science
Livecycle-State [NORM] Active

Courses

Type/SWS Course Number Title Choice in
Module-Part
Presence-Time /
Self-Study
SL SL is
required for exa.
PL CP Sem.
4L INF-42-82-K-7
Design of Secure Distributed Systems (Project)
P 56 h 184 h
PRAES
- no 8.0 irreg.
  • About [INF-42-82-K-7]: Title: "Design of Secure Distributed Systems (Project)"; Presence-Time: 56 h; Self-Study: 184 h
  • About [INF-42-82-K-7]: The study achievement "[PRAES] presentation" must be obtained.

Evaluation of grades

The module is not graded (only study achievements)..


Contents

  • Cryptographic basics
  • Securing network protocols
  • Security analysis

Competencies / intended learning achievements

The students are able to design new or existing protocols. They have practiced cryptographic and other protection mechanisms.

Upon successful completion of the module, students will be able to

  • determine basic and extended requirements for a system solution in discussions with users,
  • independently define additional requirements for a system solution according to heuristic criteria
  • divide agreed and self-chosen tasks into subtasks and to work on them together in a cooperative manner,
  • estimate and plan the project effort in detail and to use resources in a goal-oriented way,
  • document, manage and present work results comprehensively and accurately
  • present a specialist lecture using suitable media to a heterogeneous specialist audience,
  • lead and moderate a well-founded discussion on the chosen topic based on a technical lecture,
  • assess their own scope for action and decision-making and the associated responsibility and, if necessary, obtain targeted information, define priorities, derive tasks, develop solutions and monitor progress
  • recognize misunderstandings and role conflicts in communication situations at an early stage and to contribute to conflict resolution,
  • argue goal-oriented in controversial discussions and to deal with criticism objectively,
  • participate constructively and actively in heterogeneous working groups,
  • represent independent points of view and, if necessary, points of view that differ from others in a very comprehensible way and to argue plausibly and convincingly.
  • lead, instruct and motivate a working group frequently
  • lead heterogeneously composed groups responsibly and to represent work results to third parties.
  • develop their own professional, methodological, technological, interdisciplinary, social and personal skills independently.

Literature

Menezes, Orschoot, van der Merwe: Handbook of Applied Cryptography

Requirements for attendance of the module (informal)

None

Requirements for attendance of the module (formal)

None

References to Module / Module Number [INF-42-82-M-7]

Course of Study Section Choice/Obligation
[INF-88.79-SG] M.Sc. Computer Science [Specialisation] Specialization 1 [WP] Compulsory Elective