Introduction to Information Security
2013-2014
-
IMT1121
- 10 ECTS
Expected learning outcomes
Knowledge
- Define and describe technical, legal and organisational aspects of information security
- Explain the terminology used in information security
- Knows the history, traditions, distinctive characters and societal importance of information systems
- Present the general threat scenario
Skills
- Apply acquired academic knowledge on practical and theoretical problems and explain his/her choices
- Find, asses and refer to information and scholarly subject matter and present it in a manner that sheds light on the problem
- Masters relevant academic styles
General competence:
- Is aware of relevant academic, legal and professional issues
- Can carry out and document independent work in accordance with good academic practice
- Can communicate academic subject matters, both in writing and orally
- Know basic methods within new thinking and innovation processes
Topic(s)
- Background, notivation and need for information security
- Legal and ethical issues
- Risk management in information security
- Planning for security
- Firewalls and VPN
- Intrusion detection systems
- Authentication
- Cryptography
- Physical security
Teaching Methods
Lectures
Group works
Mandatory assignments
Form(s) of Assessment
Portfolio Assessment
Form(s) of Assessment (additional text)
The portfolio consist of 4 assignments, all assignments are evaluated. The assignments are handed in both via Fronter and double sided paper copies to the lecturer
Grading Scale
Alphabetical Scale, A(best) – F (fail)
External/internal examiner
Evaluated by internal examiner. External examiner is used periodically (every four years, next time in 2013/2014).
Re-sit examination
No re-sit examination
Coursework Requirements
- Two portfolio hand-ins during the semester
- Two portfolio oral presentations during the semester
- The students should participate in 3KK (course in creative thinking, 3 hours)
Teaching Materials
Core reading:
- Michael E. Whitman and Herbert J. Mattord: Principles of Information Security, Thomson Course Technology, 4. ed (2012)
Additional reading
- Torgeir Daler, Roar Gulbrandsen, Tore Audun Høye og Torbjørn Sjølstad: Håndbok i datasikkerhet - informasjonsteknologi og risikostyring, Tapir Akademisk Forlag, 3. utgave (2010)
- Personopplysningsloven and personopplysningsforskriften (available online: www.lovdata.no)