Introduction to Information Security
2015-2016
-
IMT1121
- 10 ECTS
Expected learning outcomes
Knowledge
- Define and describe technical, legal and organisational aspects of information security
- Explain the terminology used in information security
- Knows the history, traditions, distinctive characters and societal importance of information systems
- Present the general threat scenario and explain how this is relevant for a given system
Skills
- Apply acquired academic knowledge on practical and theoretical problems and explain his/her choices
- Find, asses and refer to information and scholarly subject matter and present it in a manner that sheds light on the problem
- Masters relevant academic styles in the field of information security
General competence:
- Is aware of relevant academic, legal and professional issues
- Can carry out and document independent work in accordance with good academic practice
- Can communicate academic subject matters, both in writing and orally
- Know basic methods within new thinking and innovation processes
Topic(s)
- Background, motivation and need for information security
- Legal and ethical issues
- Risk management in information security
- Planning for security
- Firewalls and VPN
- Intrusion detection systems
- Authentication
- Cryptography
- Physical security
Teaching Methods
Lectures
Group works
Mandatory assignments
Form(s) of Assessment
Portfolio Assessment
Form(s) of Assessment (additional text)
The portfolio consist of 4 assignments, all assignments are evaluated. The assignments are handed in both via Fronter and double-sided paper copies to the exams office.
Grading Scale
Alphabetical Scale, A(best) – F (fail)
External/internal examiner
Evaluated by internal and external examiner.
Re-sit examination
No re-sit examination
Coursework Requirements
- Two portfolio hand-ins during the semester
- Two portfolio oral presentations during the semester
- The student must complete the digital 3IKK course (3 hour creativity course) and the subsequent group work.
Teaching Materials
Core reading:
- Michael E. Whitman and Herbert J. Mattord: Principles of Information Security, Thomson Course Technology, 4. ed (2012)
- Gene Kim, Kevin Behr and George Spafford: The Phoenix Project: A Novel About IT, Dev Ops and Helping your Business Win, IT Revolution Press, First edition (2013). Available as e-book on Amazon
- Hand-outs
Additional reading
- Torgeir Daler, Roar Gulbrandsen, Tore Audun Høye og Torbjørn Sjølstad: Håndbok i datasikkerhet - informasjonsteknologi og risikostyring, Tapir Akademisk Forlag, 3. utgave (2010)
- Personopplysningsloven and personopplysningsforskriften (available online: www.lovdata.no)