Information Security and Security Architecture
- IMT4162 - 10 ECTS

Expected learning outcomes

Students who have passed this course should:
- have acquired good knowledge of the common terminology and security models in information security
- understand the security mechanisms of operating systems and databases
- understand the general problems in software security
- understand the most common software vulnerabilities (buffer overflows, race conditions and input validation etc)
- understand the problems of randomness


Introduction to information security including:
- Identification, authentication, authorization and access control
- Security models
- Overview of software systems engineering and architecture principles for software security
- Security evaluation of products and systems, attack trees and source-level security auditing tools
- Practical security in common operating systems
- Analysis of technology such as programming languages, operating systems and authentication
- Buffer overflow, race conditions and other common threats for software solutions
- Database security
- Problems of randomness and determinism
- Client security and malicious software

Teaching Methods

Laboratory work
Project work

Form(s) of Assessment


Form(s) of Assessment (additional text)

An overall evaluation based on a 100 point scale, where mid-term exam counts 33 points, project work (incl. oral presentation) counts 34 points and final exam counts 33 points. Conversion from 100 point scale to A-F scale according to recommended conversion table. In specific circumstances, emneansvarlig can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale.

Grading Scale

Alphabetical Scale, A(best) – F (fail)

Coursework Requirements