Courses are together with exams the building blocks for modules. Please keep in mind that information on the contents, learning outcomes and, especially examination conditions are given on the module level only – see section "Assignment to Modules" above.
additional remarks |
Despite widely deployed standard security software like anti-virus scanners or firewalls, malicious software, malware, remains a severe threat to confidentiality and integrity of private and industrial assets. In the past years there was a clear trend toward increasing complexity, tailored functionality, and more aggressive spreading and infection behavior of malicious software.
In particular, recent cases of so-called advanced persistent threats like Stuxnet that were able to compromise physical assets clearly underline the need of more advanced detection and analysis measures to thwart this threat.
Apart from the detection of known malware, it is important to analyze and understand the behavior of new malware types, as found in the wild, to understand and assess their malicious potential. Following the “know-your-enemy” paradigm, observing and analyzing malware behavior can help us to improve understanding of basic behavioral principles and patterns in order to build more advanced and tailored defense mechanisms capable of coping with today’s malware sophistication. |
Links |
TUMonline entry
|