This video belongs to the openHPI course Tatort Internet: Edition 2022. Do you want to see more?
An error occurred while loading the video player, or it takes a long time to initialize. You can try clearing your browser cache. Please try again later and contact the helpdesk if the problem persists.
Scroll to current position
- 00:00Crime Scene Internet Attack Vectors and protective measures welcome
- 00:05to our online course daily there are news on television in the newspapers
- 00:12about new cyber attacks of very different kinds,
- 00:16whole cities are taken off the grid Hospitals can no longer treat patients,
- 00:22because all the medical data is encrypted.
- 00:25Blackmailers want money for for the decryption with
- 00:28Spam mail attacks is being worked in the Christmas mail will be charting software.
- 00:36He hides, so many problems with this meanwhile nevertheless
- 00:42fundamental infrastructure of our infrastructure of our digital world,
- 00:46if you now want to understand understand,
- 00:48what is actually going on? Why and how do such attacks work,
- 00:54if they want to bring light into the darkness of the jungle about all this?
- 01:00Terms that are mentioned in the cyber security context and very important,
- 01:06if you want to protect yourself and be safer on the Internet,
- 01:10then you are exactly right here with our course,
- 01:13what we offer are.
- 01:16Numerous as is always the case with these courses are short videos,
- 01:19which are then followed by interactive quizzes and assignments,
- 01:23where they can immediately check whether the details of the topic well.
- 01:30understood and then the whole thing becomes interesting because of that,
- 01:34that on the discussion platforms there is the possibility to learn with the others and
- 01:39exchange own experiences with those of other learners in similar situations
- 01:47and they can also get a certificate certificate for attending the course,
- 01:53There are no entry requirements. entry requirement,
- 01:56so everybody should be able to do it.
- 02:00To deal, with a certain effort with these issues,
- 02:03what we are introducing here and where we want to introduce them,
- 02:07to know at the end,
- 02:10so what we're encouraging them to do is deal with the
- 02:15material to help understand in more detail,
- 02:17how the digital world works,
- 02:21where the points of attack are,
- 02:23which weaknesses have to be must be overcome by one's own activities,
- 02:28which systematic problems there are and in dealing with these
- 02:36learning material you should progress noise regulation,
- 02:42to see exactly where they stand and again the discussion forum that is very important with others
- 02:51learners to exchange information about their experience of their experience,
- 02:56if they have not understood exactly,
- 02:58when they see things differently. That they have the possibility with
- 03:02with others and to with us about it,
- 03:04what do we want to do in detail in our openhpi course Crime Scene Internet,
- 03:12we want to give an introduction to this basic topic of internet security,
- 03:15to do that we need to understand a bit understand how the internet works,
- 03:18how the World Wide Web works,
- 03:21how such applications are built and where the cybercriminals are able to attack,
- 03:31which actors are on the on the Internet and which
- 03:35dangers lurk there Laura I take on whole
- 03:38different places and we want to then discuss them in more detail in the individual weeks,
- 03:42so we're going to start in week two with the digital identities,
- 03:47so if we use a service on the Internet Amazon account are set up,
- 03:52where our activities are accumulated,
- 03:55so online account over then pay and order processed.
- 03:59And for this the application recognise us,
- 04:03who we are in the network, how does what role do passwords play in this,
- 04:09because that is the protection mechanism, which then protects our accounts from unauthorised use and
- 04:16what are the problems around passwords in terms of cyber security,
- 04:20then in the third week we want to address another complex,
- 04:25which is very important in the cyber security on the Internet,
- 04:33because that's treasure. Software malware that hackers use to grab unauthorised data,
- 04:39with which hackers can influence certain things data and manipulate them,
- 04:47so what are there different types of malware,
- 04:52what attack vectors do they carry and how does this can this malware even open?
- 04:59kidney computers, these are the the issues that we will be dealing with in the third
- 05:03week will occupy the fourth
- 05:06week will be about how information is transmitted via the Internet,
- 05:10i.e. via the transport routes the internet as a network of networks
- 05:14with quite different responsible for the
- 05:17individual parts nice eat and secure network without own
- 05:21Measures can information via the Internet
- 05:25sent can be viewed by unauthorised or even manipulated,
- 05:31so this is a subject we will in the fourth week,
- 05:35why the internet is so insecure and how the widespread attacks work,
- 05:41which right here on the transport routes,
- 05:46the essential protective measure there are encryption encryption,
- 05:50so, we can't prevent that the hackers can access data
- 05:54transported over the Internet being transported over the internet,
- 05:56but we can prevent those who have can understand,
- 06:00that you can do that with the data from doing that, we can do that by
- 06:03encryption prevent encryption,
- 06:06that is the technique of cryptography which plays a big and that is the topic of week 5,
- 06:12We want to look at the different methods and methods and we want to see,
- 06:15what technical possibilities there are for our news
- 06:20before they are transported over the insecure internet
- 06:24Funsport ways to protect and then we are already
- 06:29almost at the end but have to one more big block
- 06:32address in the context of cybersecurity, namely privacy,
- 06:38what about the privacy internet,
- 06:40what are the risks of the digital world?
- 06:43So, if you want to be reachable everywhere with your smartphone you want to be reachable everywhere,
- 06:47then the corresponding mobile operator know exactly,
- 06:51where they are at that second,
- 06:53so that's information,
- 06:56that is needed to use digital digital services can do that.
- 07:00be misused, what does that look like,
- 07:02if such data is then known,
- 07:06what influence does on privacy,
- 07:08how can I protect my privacy also be visible to others,
- 07:15what movement is do on the internet?
- 07:17So, these are the big Themes that will be discussed in the 6th session.
- 07:20week will be addressed further course information,
- 07:26we have now started with the bus on the 13th
- 07:30May 2020 the course.
- 07:34End will be after 6 weeks on the 24th.
- 07:37June this year and the final examination will take place the following week,
- 07:44you are free to decide when you have to take the time,
- 07:47but then do it in one go,
- 07:51if you want to deal with the want to deal with the course,
- 07:54with what amount of work and time you have to depends, of course, on the form.
- 07:59Education but the thorough occupation with the
- 08:02learning materials and self-testing which we think prompts
- 08:06per week employment from three to six hours of weekly homework,
- 08:13these are important for Sat fikc because they have to be included in the
- 08:17homework 50% of the score,
- 08:20For this they then have 60 minutes every week
- 08:25so and of course we can discuss everything in depth,
- 08:28so I could recommend some some reading material here,
- 08:34so e.g. Our book with Harald Sack on digital communication,
- 08:40there is a lot of material to read more about the functionality of the internet,
- 08:46how it all works,
- 08:49can be found in the volume internetworking and decoupled questions of security
- 08:56then in this small booklet Security and Trust.
- 09:01Short introduction of the teaching team my name is Christoph I mean.
- 09:05I am dean and director of the Hasso Plattner Institute.
- 09:09Hold the chair for Internet Technologies and Systems and in our
- 09:13research we concentrate on the topic of security on the one hand on the topic of security, which is why
- 09:19also then the teaching team doctoral students work with me,
- 09:26who are active in this subject. We are working on
- 09:30chair but also with with digital learning.
- 09:33developed these openhpi platforms and in this respect we are always very interested in a
- 09:42such learning happen and also to measure the learning progress,
- 09:46these are my capable companions and supporters Erik Klima Alexander Mühle,
- 09:53Chapel Daniel Köhler everything PhD students in the field of security,
- 09:57this one in the kiss. Who created the course together with me,
- 10:04who developed the questions set the examination questions and who
- 10:09in the discussion forums then also in the discussion forums and give their opinion and
- 10:17help and with them vigorous discussion.
- 10:21They will also individually get to know each other at various
- 10:24securitisation videos on many a topic,
- 10:27there is another digression, that is interesting for the interested
- 10:31who then really want to know more about about this subject,
- 10:35that is perhaps not so necessary for the overall understanding.
- 10:40So, we are now looking forward to the start of our openhpi course crime scene internet attack vectors
- 10:49and protective measures a lot of fun and many new experiences and insights.
To enable the transcript, please select a language in the video player settings menu.
About this video
Prof. Meinels Einführung zum Kurs