Basic crypto knowledge
Expected learning outcomes
The student is expected to have insight into:
- why network security is important
- which mechanisms are required and available for protection of networked systems
- how these mechanisms are used to resolve security challenges in particular systems
- high security solutions
The course will provide the student with the foundation required for implementing protection systems and for continuing research in the field.
- The candidate possesses advanced knowledge in network security, including collaborative efforts
- The candidate possesses thorough knowledge about theory and application of network security.
- The candidate is capable of analyzing existing theories, methods and interpretations in the field of network security and working independently on solving theoretical and practical problems.
- The candidate can use relevant scientific methods in independent research and development in network security.
- The candidate is capable of performing critical analysis of various literature sources and applying them in structuring and formulating reasoning in network security.
- The candidate is capable to design “best practice” secure networked architecture.
- The candidate is capable of analyzing in a given architecture the risks and of envisioning the boards of security.
- The candidate is capable of applying his/her cryptographic knowledge and skills in new network / security architecture.
- The candidate can work independently and is familiar with topic-related terminology.
- The candidate is capable of discussing professional problems, analyses and conclusions in the field of network security, with specialists, decision makers and general audience.
Part I Introduction :
- Network infrastructure and security threats
- Anatomy of attacks
Part II Protection methods :
As revision course:
Encryption, device authentication, message authentication and protection of integrity
Key management: symmetric keys, public key infrastructure, certificates, revocation, and key escrows.
- Identity management and acccess control
- Firewalls, IDS, and protection advanced method against attacks, defense-in-depth
- Collaborative security efforts, e.g. information sharing
Part III SCADA & Smart Grid security
- Problem statement
- Defense mechanism, including why architecture matters.
Teaching Methods (additional text)
The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement. The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through GUC’s learning management system (ClassFronter).
Form(s) of Assessment
Form(s) of Assessment (additional text)
An overall evaluation is based on a 100 point scale, where the essay counts 50 points and the final exam (3 hours) counts 50 points. Conversion from 100 point scale to A-F scale according to recommended conversion table. In specific circumstances, emneansvarlig can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale
Alphabetical Scale, A(best) – F (fail)
Internal examiner. An external examiner will be used every 4th year. Next time in the school-year 2014/2015.
For the final exam: Ordinary re-sit examnination.
Textbook (still in Evaluation)
Additional Material will be provided on fronter
Replacement course for