Lecture | Information Systems

Business Networks: Information Security


This lecture covers the foundations of information security including the specification of protection goals, adversary models, security mechanisms (e.g., identification, access control) and cryptographic primitives to enforce protection goals in distributed systems (e.g., symmetric and asymmetric encryption, integrity protection). Security mechanisms will be discussed both from the perspective of a system operator, who protects a larger distributed system, as well as from the end users’ point of view, who may wish to use security technology to self-protect against untrustworthy system operators.

Learning outcomes

This course contributes to ensure that every graduate who potentially makes decisions with security impact has sufficient knowledge to a) identify security issues, b) communicate effectively with security experts, c) keep aware of changing technological limits, d) evaluate security advises critically and comprehensively, e) oversee the implementation of security measures, and f) assume responsibility for their effects and potential sideeffects.