Software Security Trends
2012-2013
-
IMT4122
- 5 ECTS
On the basis of
Software development skills are important, previous exposition to software security basics as, e.g., in IMT3501 Software Security is helpful.
Expected learning outcomes
Knowledge:
Students who have completed this course are expected to possess thorough knowledge of current software security challenges, well-known vulnerabilities, attack methods, secure software engineering principles, and strategies to avoid vulnerabilities. They can apply their knowledge to situations and tools addressed in the course and are able to transfer their skills to new application areas in their workplace or further academic studies.
Skills:
Students can explain why and how protection methods work and are able to determine the limits of protection. They can gather information on the state of research and practice and discuss a current issue of software security in an independently-written report under ephemeral guidance.
General competence:
In lab exercises students demonstrate contributions to innovation by solving challenging tasks and by improving software artifacts in maintenance settings.
Topic(s)
- Goals and technical trends of software security.
- System design.
- Software vulnerabilities.
- Code reviews.
- Software security testing.
Teaching Methods
Lectures
Laboratory work
PBL (Problem Based Learning)
Project work
Teaching Methods (additional text)
The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement. The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through GUC’s learning management system (ClassFronter).
Form(s) of Assessment
Evaluation of Project(s)
Form(s) of Assessment (additional text)
Assessment of one project
Grading Scale
Alphabetical Scale, A(best) – F (fail)
External/internal examiner
One internal examiner. An external examiner will be used every 4th year. Next time in the school-year 2014/2015.
Re-sit examination
Students who fail can submit one new report based on a topic assigned by the instructor.
Teaching Materials
Book: Dowd, M., McDonald, J., and Schuh, J. (2006). The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. ISBN 0-321-44442-6. Library 005.8 Dow
Scientific articles as supplied by the instructor during the course