Introduction to Information Security
2014-2015 - IMT1121 - 10 ECTS

Expected learning outcomes

Knowledge

  • Define and describe technical, legal and organisational aspects of information security
  • Explain the terminology used in information security
  • Knows the history, traditions, distinctive characters and societal importance of information systems
  • Present the general threat scenario and explain how this is relevant for a given system

Skills

  • Apply acquired academic knowledge on practical and theoretical problems and explain his/her choices
  • Find, asses and refer to information and scholarly subject matter and present it in a manner that sheds light on the problem
  • Masters relevant academic styles in the field of information security

General competence:

  • Is aware of relevant academic, legal and professional issues
  • Can carry out and document independent work in accordance with good academic practice
  • Can communicate academic subject matters, both in writing and orally
  • Know basic methods within new thinking and innovation processes

Topic(s)

  • Background, motivation and need for information security 
  • Legal and ethical issues
  • Risk management in information security
  • Planning for security
  • Firewalls and VPN
  • Intrusion detection systems 
  • Authentication
  • Cryptography
  • Physical security

Teaching Methods

Lectures
Group works
Mandatory assignments

Form(s) of Assessment

Portfolio Assessment

Form(s) of Assessment (additional text)

The portfolio consist of 4 assignments, all assignments are evaluated. The assignments are handed in both via Fronter and double-sided paper copies to the exams office.

Grading Scale

Alphabetical Scale, A(best) – F (fail)

External/internal examiner

Evaluated by internal examiner. External examiner is used periodically (every four years, next time in 2017/2018).

Re-sit examination

No re-sit examination

Coursework Requirements

  • Three portfolio hand-ins during the semester
  • One portfolio oral presentations during the semester
  • The student must complete the digital 3IKK course (3 hour creativity course) and the subsequent group work.

Teaching Materials

Core reading:

  • Gene Kim, Kevin Behr and George Spafford: The Phoenix Project: A Novel About IT, Dev Ops and Helping your Business Win, IT Revolution Press, First edition (2013). Available as e-book on Amazon
  • Hand-outs

Additional reading

  • Michael E. Whitman and Herbert J. Mattord: Principles of Information Security, Thomson Course Technology, 4. ed (2012)
  • Torgeir Daler, Roar Gulbrandsen, Tore Audun Høye og Torbjørn Sjølstad: Håndbok i datasikkerhet - informasjonsteknologi og risikostyring, Tapir Akademisk Forlag, 3. utgave (2010)
  •  Personopplysningsloven and personopplysningsforskriften (available online: www.lovdata.no)