On the basis of
Basic crypto knowledge
Expected learning outcomes
The student is expected to have insight into:
- why network security is important
- which mechanisms are required and available for protection of networked systems
- how these mechanisms are used to resolve security challenges in particular systems
- high security solutions
The course will provide the student with the foundation required for implementing protection systems and for continuing research in the field.
- The candidate possesses advanced knowledge in network security, including collaborative efforts.
- The candidate possesses thorough knowledge about theory and application of network security.
- The candidate is capable of analyzing existing theories, methods and interpretations in the field of network security and working independently on solving theoretical and practical problems.
- The candidate can use relevant scientific methods in independent research and development in network security.
- The candidate is capable of performing critical analysis of various literature sources and applying them in structuring and formulating reasoning in network security.
- The candidate is capable to design “best practice” secure networked architecture.
- The candidate is capable of analyzing in a given architecture the risks and of envisioning the borders of security.
- The candidate is capable of applying his/her cryptographic knowledge and skills in new network / security architecture.
- The candidate can work independently and is familiar with topic-related terminology.
- The candidate is capable of discussing professional problems, analyses and conclusions in the field of network security, with specialists, decision makers and general audience.
Part I Introduction :
- Trust as an issue of network security: collaborative efforts
- Network infrastructure and security threats
- Anatomy of attacks
Part II Protection methods :
- Applying security mechanism as encryption, device authentication, message authentication protection of integrity etc.
- Key management: symmetric keys, public key infrastructure, certificates, revocation, and key escrows
- Identity management and acccess control
- Firewalls, IDS, and protection advanced method against attacks, defence-in-depth
- Collaborative security efforts, e.g. information sharing
Part III SCADA & Smart Grid security
- Problem statement
- Defense mechanism, including why architecture matters
Recent advanced methodologies and new upcoming issues will be brought in this course due to actual needs
Teaching Methods (additional text)
Lectures, 3 days
Essay: Individual essay contribution in groups
The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement. The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through GUC’s learning management system (Digital classroom in Fronter).
Form(s) of Assessment
Form(s) of Assessment (additional text)
An overall evaluation is based on a 100 point scale, where the essay counts 50 points and the final written exam (90 minutes) counts 50 points. Conversion from 100 point scale to A-F scale according to recommended conversion table. In specific circumstances, emneansvarlig can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale
Alphabetical Scale, A(best) – F (fail)
Internal examiner. An external examiner will be used every 4th year (written final exam), next time in the academic year 2014/2015.
For the final written exam: Ordinary re-sit examination.
Paperbook Dictionary (mother tongue/English)
Scriptum, PPT and Additional Material will be provided in Fronter.
Specific parts of CCNA security curriculum will be part of ToDo.
Recommendation of textbook will be decided during Spring 2014.
Replacement course for