Silvia Schmidt, BSc MSc Competence Center for IT-Security Academic Staff silvia.schmidt@fh-campuswien.ac.at T: +43 1 606 68 77-2470 F: +43 1 606 68 77-2469 Room: B.2.15 Favoritenstraße 226 1100 WienPersonal WebspaceLectures 2021/22Applied Life Sciences> Network and Internet Technologies ILV Bioinformatics moreNetwork and Internet Technologies ILVLector: Silvia Schmidt, BSc MSc1SWS2ECTSLecture contentsInternet survey Internet-of-Things / Biothings survey LoRaWAN Project IT-Security basics Genome browser basicsAssessment methodsWritten exam & practical exercisesTeaching methodslecture, exercises, inverted classroomLanguageGermanEngineering> Secure Software Development VO IT-Security moreSecure Software Development VOLector: DI Thomas Konrad, Silvia Schmidt, BSc MSc2SWS3ECTSLecture contents* Versioncontrol * Test Driven Development * Web Application Security * Security errors * Tool for software analysisAssessment methods* Final exam * Grading of the presentationsTeaching methods* Lessons * Presentations by student groups> Mobile and Embedded Security VO IT-Security moreMobile and Embedded Security VOLector: Tobias Buchberger, BSc MSc, FH-Prof. DI Gerhard Engelmann, Silvia Schmidt, BSc MSc, DI Mathias Tausig2SWS3ECTSLecture contentsASN.1 Smartcards Constrained Networking Mobile Authentication RIOT-OS Secure Firmware Update Internet-of-Things (IoT-Security) Overview Embedded CAssessment methodsIntermediate tests, distance/remote learning, final exam.Teaching methodsLectures and remote/distance learning English slidesLanguageEnglish> Mobile and Embedded Security Übung UE IT-Security moreMobile and Embedded Security Übung UELector: Tobias Buchberger, BSc MSc, Silvia Schmidt, BSc MSc1SWS2ECTSLecture contentsThe exercises are teaching the useage of and development for smartcards. Students will need to complete the following exercices (alone and in groups): * Usage of PKCS#11 tokens in application software * Access to a smartcard using PC/SC and APDUs * Integrating a PKCS#11 token or a JavaCard into an authentication softwareAssessment methodsThe grade will be calculated based on the projectsTeaching methodsProgramming in groupsLanguageEnglish> Secure Software Development Übung UE IT-Security moreSecure Software Development Übung UELector: Silvia Schmidt, BSc MSc2SWS3ECTSLecture contentsPractical application of the topics covered in the lecture by implementing a specific project. Code review of an unknown program.Assessment methodsGrading of the projects, presentation of the results.Teaching methodsProgramming exercisesLanguageGerman> Application Security ILV IT-Security moreApplication Security ILVLector: Tobias Buchberger, BSc MSc, Silvia Schmidt, BSc MSc2SWS3ECTSLecture contentsThe course teaches security aspect with the runtime of applications as well as DevSecOps subjects: * Virtualisation * Container technologies * Security automation (Ansible) * Docker * CI/CD * OWASP SAMMAssessment methodsLab exercicesTeaching methodsexercises, presentationsLanguageGerman> Mobile and Embedded Security Exercise UE Electronic Systems Engineering moreMobile and Embedded Security Exercise UELector: Tobias Buchberger, BSc MSc, Silvia Schmidt, BSc MSc1SWS2ECTSLecture contentsThe exercises are teaching the useage of and development for smartcards. Students will need to complete the following exercices (alone and in groups): * Usage of PKCS#11 tokens in application software * Access to a smartcard using PC/SC and APDUs * Integrating a PKCS#11 token or a JavaCard into an authentication softwareAssessment methodsThe grade will be calculated based on the projectsTeaching methodsProgramming in groupsLanguageGerman> Mobile and Embedded Security VO Electronic Systems Engineering moreMobile and Embedded Security VOLector: Tobias Buchberger, BSc MSc, FH-Prof. DI Gerhard Engelmann, Silvia Schmidt, BSc MSc, DI Mathias Tausig2SWS3ECTSLecture contentsASN.1 Smartcards Constrained Networking Mobile Authentication RIOT-OS Secure Firmware Update Internet-of-Things (IoT-Security) Overview Embedded CAssessment methodsIntermediate tests, distance/remote learning, final exam.Teaching methodsLectures and remote/distance learning English slidesLanguageEnglish> IT Security Fundamentals ILV Computer Science and Digital Communications moreIT Security Fundamentals ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Silvia Schmidt, BSc MSc2SWS4ECTSLecture contentsThe course gives a basic overview of the technical and organizational aspects of IT security, and defines the most important terms and technologies in this context. The LV in particular covers the following contents: - Protection goals - Asymmetric and symmetric primitives (AES, RSA, ECC) and their practical applications - PKIs - TLS/HTTPS - Firewalls Fundamentals (types, possible uses, limitations) - ID(P)S Fundamentals (types, applications, limitations) - security awarenessAssessment methodsContinuous assessmentTeaching methodspractical (lab) exercises, lectureLanguageEnglish> Internet of Things ILV Computer Science and Digital Communications moreInternet of Things ILVLector: FH-Prof. Dipl.-Ing. Heimo Hirner, Silvia Schmidt, BSc MSc, Sebastian Ukleja, BSc3SWS5ECTSLecture contents(ONLY IN GERMAN - 27.02.2018) Im Internet of Things (IoT) werden physische Gegenstände über digitale Netzwerke, wie das Internet, vernetzt und virtuell verfügbar gemacht. Neben der einfachen und kostensparenden Netzwerkanbindung dieser Gegenstände ist die Entwicklung von automatisierten digitalen Netzwerkdiensten, die den zusätzlichen Nutzen der Vernetzung realisieren, Ziel des IoT. Das IoT geht einher mit Begriffen wie Industrie 4.0, oder Ubiquitous Computing. Die LV deckt insbesondere die folgenden Inhalte ab: - IoT Netzwerkarchitektur und Design - Smarte Objekte - IoT Access Technologien - Applikationsprotokolle für das IoT - Datenanalyse im IoT - IoT Datenanalyse und Management - IoT in der IndustrieAssessment methodsFinal examTeaching methods(ONLY IN GERMAN - 27.02.2018) Vortrag, praktische Übungen, FernlehreaufgabenLanguageEnglish> Elective Project 1 UE Computer Science and Digital Communications moreElective Project 1 UELector: DI Dr. techn. Mugdim Bublin, FH-Prof. DI Thomas Fischer, Leon Freudenthaler, BSc MSc, FH-Prof. FH-Hon.Prof. Priv.-Doz. Mag. DI. DI. Dr.techn. Karl Michael Göschka, FH-Prof. Dipl.-Ing. Heimo Hirner, FH-Prof. DI Dr. Igor Miladinovic, Silvia Schmidt, BSc MSc, Dr. Christian Steineder, Bernhard Taufner, BSc, MSc1SWS4ECTSLanguageGerman> Secure Admin Tools ILV Computer Science and Digital Communications moreSecure Admin Tools ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Silvia Schmidt, BSc MSc3SWS6ECTSLecture contentsThe course gives an overview and a practical introduction to the most important software tools of a system administrator in the context of secure networks. Students will be enabled to use these tools correctly and securely and to configure them accordingly. - VPNs - Hard disk encryption - SSH - Mail Security (PGP, S/MIME) - bash scripting - Establishment of PKIs - Introduction to penetration testingAssessment methodsContinuous assessment Short tests, exercise interviewsTeaching methodsPractical (lab)-exercises, LectureLanguageEnglish> Bachelor Thesis 1 SE Computer Science and Digital Communications moreBachelor Thesis 1 SELector: DI Dr. techn. Mugdim Bublin, FH-Prof. DI Thomas Fischer, Leon Freudenthaler, BSc MSc, FH-Prof. FH-Hon.Prof. Priv.-Doz. Mag. DI. DI. Dr.techn. Karl Michael Göschka, FH-Prof. Dipl.-Ing. Heimo Hirner, FH-Prof. DI Dr. Igor Miladinovic, Mag. Dipl.-Ing. Dr.techn. Wolfgang Radinger-Peer, MBA, FH-Prof.in Mag.a Dr.in Sigrid Schefer-Wenzl, MSc BSc, Silvia Schmidt, BSc MSc, Dr. Christian Steineder, Bernhard Taufner, BSc, MSc1SWS4ECTSLecture contents- Independent work on a topic from the area of Computer Science, primarily based on the technical topics of the elective modules in the 4th and 5th semesters at a scientific level under the guidance of a supervisor. - Elaboration of the bachelor thesis 1Assessment methodsFinal exam Approbation of bachelor thesisTeaching methodsImplementation of a project and elaboration as a bachelor thesis with coaching. Students present the current development of their bachelor thesis 1 at regular intervals and put it up for discussion.LanguageGerman> Elective Project 2 UE Computer Science and Digital Communications moreElective Project 2 UELector: DI Dr. techn. Mugdim Bublin, FH-Prof. DI Thomas Fischer, Leon Freudenthaler, BSc MSc, FH-Prof. FH-Hon.Prof. Priv.-Doz. Mag. DI. DI. Dr.techn. Karl Michael Göschka, FH-Prof. DI Dr. Igor Miladinovic, Mag. Dipl.-Ing. Dr.techn. Wolfgang Radinger-Peer, MBA, Silvia Schmidt, BSc MSc, Dr. Christian Steineder, Bernhard Taufner, BSc, MSc2SWS5ECTSLecture contentsStudents apply the skills acquired to complete a project in a coordinated and structured manner. project in a coordinated and structured manner. In doing so, they independently define a concrete sub-goal in the project. A well-founded theoretical approach is thus combined with practical application. Collaboration on an industrial R&D project or on current problems within the framework of the R&D activities of the UAS is possible.Assessment methodsFinal exam
> Network and Internet Technologies ILV Bioinformatics moreNetwork and Internet Technologies ILVLector: Silvia Schmidt, BSc MSc1SWS2ECTSLecture contentsInternet survey Internet-of-Things / Biothings survey LoRaWAN Project IT-Security basics Genome browser basicsAssessment methodsWritten exam & practical exercisesTeaching methodslecture, exercises, inverted classroomLanguageGerman
> Secure Software Development VO IT-Security moreSecure Software Development VOLector: DI Thomas Konrad, Silvia Schmidt, BSc MSc2SWS3ECTSLecture contents* Versioncontrol * Test Driven Development * Web Application Security * Security errors * Tool for software analysisAssessment methods* Final exam * Grading of the presentationsTeaching methods* Lessons * Presentations by student groups
> Mobile and Embedded Security VO IT-Security moreMobile and Embedded Security VOLector: Tobias Buchberger, BSc MSc, FH-Prof. DI Gerhard Engelmann, Silvia Schmidt, BSc MSc, DI Mathias Tausig2SWS3ECTSLecture contentsASN.1 Smartcards Constrained Networking Mobile Authentication RIOT-OS Secure Firmware Update Internet-of-Things (IoT-Security) Overview Embedded CAssessment methodsIntermediate tests, distance/remote learning, final exam.Teaching methodsLectures and remote/distance learning English slidesLanguageEnglish
> Mobile and Embedded Security Übung UE IT-Security moreMobile and Embedded Security Übung UELector: Tobias Buchberger, BSc MSc, Silvia Schmidt, BSc MSc1SWS2ECTSLecture contentsThe exercises are teaching the useage of and development for smartcards. Students will need to complete the following exercices (alone and in groups): * Usage of PKCS#11 tokens in application software * Access to a smartcard using PC/SC and APDUs * Integrating a PKCS#11 token or a JavaCard into an authentication softwareAssessment methodsThe grade will be calculated based on the projectsTeaching methodsProgramming in groupsLanguageEnglish
> Secure Software Development Übung UE IT-Security moreSecure Software Development Übung UELector: Silvia Schmidt, BSc MSc2SWS3ECTSLecture contentsPractical application of the topics covered in the lecture by implementing a specific project. Code review of an unknown program.Assessment methodsGrading of the projects, presentation of the results.Teaching methodsProgramming exercisesLanguageGerman
> Application Security ILV IT-Security moreApplication Security ILVLector: Tobias Buchberger, BSc MSc, Silvia Schmidt, BSc MSc2SWS3ECTSLecture contentsThe course teaches security aspect with the runtime of applications as well as DevSecOps subjects: * Virtualisation * Container technologies * Security automation (Ansible) * Docker * CI/CD * OWASP SAMMAssessment methodsLab exercicesTeaching methodsexercises, presentationsLanguageGerman
> Mobile and Embedded Security Exercise UE Electronic Systems Engineering moreMobile and Embedded Security Exercise UELector: Tobias Buchberger, BSc MSc, Silvia Schmidt, BSc MSc1SWS2ECTSLecture contentsThe exercises are teaching the useage of and development for smartcards. Students will need to complete the following exercices (alone and in groups): * Usage of PKCS#11 tokens in application software * Access to a smartcard using PC/SC and APDUs * Integrating a PKCS#11 token or a JavaCard into an authentication softwareAssessment methodsThe grade will be calculated based on the projectsTeaching methodsProgramming in groupsLanguageGerman
> Mobile and Embedded Security VO Electronic Systems Engineering moreMobile and Embedded Security VOLector: Tobias Buchberger, BSc MSc, FH-Prof. DI Gerhard Engelmann, Silvia Schmidt, BSc MSc, DI Mathias Tausig2SWS3ECTSLecture contentsASN.1 Smartcards Constrained Networking Mobile Authentication RIOT-OS Secure Firmware Update Internet-of-Things (IoT-Security) Overview Embedded CAssessment methodsIntermediate tests, distance/remote learning, final exam.Teaching methodsLectures and remote/distance learning English slidesLanguageEnglish
> IT Security Fundamentals ILV Computer Science and Digital Communications moreIT Security Fundamentals ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Silvia Schmidt, BSc MSc2SWS4ECTSLecture contentsThe course gives a basic overview of the technical and organizational aspects of IT security, and defines the most important terms and technologies in this context. The LV in particular covers the following contents: - Protection goals - Asymmetric and symmetric primitives (AES, RSA, ECC) and their practical applications - PKIs - TLS/HTTPS - Firewalls Fundamentals (types, possible uses, limitations) - ID(P)S Fundamentals (types, applications, limitations) - security awarenessAssessment methodsContinuous assessmentTeaching methodspractical (lab) exercises, lectureLanguageEnglish
> Internet of Things ILV Computer Science and Digital Communications moreInternet of Things ILVLector: FH-Prof. Dipl.-Ing. Heimo Hirner, Silvia Schmidt, BSc MSc, Sebastian Ukleja, BSc3SWS5ECTSLecture contents(ONLY IN GERMAN - 27.02.2018) Im Internet of Things (IoT) werden physische Gegenstände über digitale Netzwerke, wie das Internet, vernetzt und virtuell verfügbar gemacht. Neben der einfachen und kostensparenden Netzwerkanbindung dieser Gegenstände ist die Entwicklung von automatisierten digitalen Netzwerkdiensten, die den zusätzlichen Nutzen der Vernetzung realisieren, Ziel des IoT. Das IoT geht einher mit Begriffen wie Industrie 4.0, oder Ubiquitous Computing. Die LV deckt insbesondere die folgenden Inhalte ab: - IoT Netzwerkarchitektur und Design - Smarte Objekte - IoT Access Technologien - Applikationsprotokolle für das IoT - Datenanalyse im IoT - IoT Datenanalyse und Management - IoT in der IndustrieAssessment methodsFinal examTeaching methods(ONLY IN GERMAN - 27.02.2018) Vortrag, praktische Übungen, FernlehreaufgabenLanguageEnglish
> Elective Project 1 UE Computer Science and Digital Communications moreElective Project 1 UELector: DI Dr. techn. Mugdim Bublin, FH-Prof. DI Thomas Fischer, Leon Freudenthaler, BSc MSc, FH-Prof. FH-Hon.Prof. Priv.-Doz. Mag. DI. DI. Dr.techn. Karl Michael Göschka, FH-Prof. Dipl.-Ing. Heimo Hirner, FH-Prof. DI Dr. Igor Miladinovic, Silvia Schmidt, BSc MSc, Dr. Christian Steineder, Bernhard Taufner, BSc, MSc1SWS4ECTSLanguageGerman
> Secure Admin Tools ILV Computer Science and Digital Communications moreSecure Admin Tools ILVLector: FH-Prof. Dipl.-Ing. Manuel Koschuch, Bakk.techn., Silvia Schmidt, BSc MSc3SWS6ECTSLecture contentsThe course gives an overview and a practical introduction to the most important software tools of a system administrator in the context of secure networks. Students will be enabled to use these tools correctly and securely and to configure them accordingly. - VPNs - Hard disk encryption - SSH - Mail Security (PGP, S/MIME) - bash scripting - Establishment of PKIs - Introduction to penetration testingAssessment methodsContinuous assessment Short tests, exercise interviewsTeaching methodsPractical (lab)-exercises, LectureLanguageEnglish
> Bachelor Thesis 1 SE Computer Science and Digital Communications moreBachelor Thesis 1 SELector: DI Dr. techn. Mugdim Bublin, FH-Prof. DI Thomas Fischer, Leon Freudenthaler, BSc MSc, FH-Prof. FH-Hon.Prof. Priv.-Doz. Mag. DI. DI. Dr.techn. Karl Michael Göschka, FH-Prof. Dipl.-Ing. Heimo Hirner, FH-Prof. DI Dr. Igor Miladinovic, Mag. Dipl.-Ing. Dr.techn. Wolfgang Radinger-Peer, MBA, FH-Prof.in Mag.a Dr.in Sigrid Schefer-Wenzl, MSc BSc, Silvia Schmidt, BSc MSc, Dr. Christian Steineder, Bernhard Taufner, BSc, MSc1SWS4ECTSLecture contents- Independent work on a topic from the area of Computer Science, primarily based on the technical topics of the elective modules in the 4th and 5th semesters at a scientific level under the guidance of a supervisor. - Elaboration of the bachelor thesis 1Assessment methodsFinal exam Approbation of bachelor thesisTeaching methodsImplementation of a project and elaboration as a bachelor thesis with coaching. Students present the current development of their bachelor thesis 1 at regular intervals and put it up for discussion.LanguageGerman
> Elective Project 2 UE Computer Science and Digital Communications moreElective Project 2 UELector: DI Dr. techn. Mugdim Bublin, FH-Prof. DI Thomas Fischer, Leon Freudenthaler, BSc MSc, FH-Prof. FH-Hon.Prof. Priv.-Doz. Mag. DI. DI. Dr.techn. Karl Michael Göschka, FH-Prof. DI Dr. Igor Miladinovic, Mag. Dipl.-Ing. Dr.techn. Wolfgang Radinger-Peer, MBA, Silvia Schmidt, BSc MSc, Dr. Christian Steineder, Bernhard Taufner, BSc, MSc2SWS5ECTSLecture contentsStudents apply the skills acquired to complete a project in a coordinated and structured manner. project in a coordinated and structured manner. In doing so, they independently define a concrete sub-goal in the project. A well-founded theoretical approach is thus combined with practical application. Collaboration on an industrial R&D project or on current problems within the framework of the R&D activities of the UAS is possible.Assessment methodsFinal exam