Introduction to Information Security
2013-2014 - IMT1121 - 10 ECTS

Expected learning outcomes


  • Define and describe technical, legal and organisational aspects of information security
  • Explain the terminology used in information security
  • Knows the history, traditions, distinctive characters and societal importance of information systems
  • Present the general threat scenario


  • Apply acquired academic knowledge on practical and theoretical problems and explain his/her choices
  • Find, asses and refer to information and scholarly subject matter and present it in a manner that sheds light on the problem
  • Masters relevant academic styles

General competence:

  • Is aware of relevant academic, legal and professional issues
  • Can carry out and document independent work in accordance with good academic practice
  • Can communicate academic subject matters, both in writing and orally
  • Know basic methods within new thinking and innovation processes


  • Background, notivation and need for information security 
  • Legal and ethical issues
  • Risk management in information security
  • Planning for security
  • Firewalls and VPN
  • Intrusion detection systems 
  • Authentication
  • Cryptography
  • Physical security

Teaching Methods

Group works
Mandatory assignments

Form(s) of Assessment

Portfolio Assessment

Form(s) of Assessment (additional text)

The portfolio consist of 4 assignments, all assignments are evaluated. The assignments are handed in both via Fronter and double sided paper copies to the lecturer

Grading Scale

Alphabetical Scale, A(best) – F (fail)

External/internal examiner

Evaluated by internal examiner. External examiner is used periodically (every four years, next time in 2013/2014).

Re-sit examination

No re-sit examination

Coursework Requirements

  • Two portfolio hand-ins during the semester
  • Two portfolio oral presentations during the semester
  • The students should participate in 3KK (course in creative thinking, 3 hours)

Teaching Materials

Core reading:

  •  Michael E. Whitman and Herbert J. Mattord: Principles of Information Security, Thomson Course Technology, 4. ed (2012)

Additional reading

  • Torgeir Daler, Roar Gulbrandsen, Tore Audun Høye og Torbjørn Sjølstad: Håndbok i datasikkerhet - informasjonsteknologi og risikostyring, Tapir Akademisk Forlag, 3. utgave (2010)
  •  Personopplysningsloven and personopplysningsforskriften (available online: