Lehrveranstaltungen sind neben Prüfungen Bausteine von Modulen. Beachten Sie daher, dass Sie Informationen zu den Lehrinhalten und insbesondere zu Prüfungs- und Studienleistungen in der Regel nur auf Modulebene erhalten können (siehe Abschnitt "Zuordnung zu Modulen" oben).
ergänzende Hinweise |
Despite widely deployed standard security software like anti-virus scanners or firewalls, malicious software, malware, remains a severe threat to confidentiality and integrity of private and industrial assets. In the past years there was a clear trend toward increasing complexity, tailored functionality, and more aggressive spreading and infection behavior of malicious software.
In particular, recent cases of so-called advanced persistent threats like Stuxnet that were able to compromise physical assets clearly underline the need of more advanced detection and analysis measures to thwart this threat.
Apart from the detection of known malware, it is important to analyze and understand the behavior of new malware types, as found in the wild, to understand and assess their malicious potential. Following the “know-your-enemy” paradigm, observing and analyzing malware behavior can help us to improve understanding of basic behavioral principles and patterns in order to build more advanced and tailored defense mechanisms capable of coping with today’s malware sophistication. |
Links |
TUMonline-Eintrag
|