Expected learning outcomes
- The candidate will have a thorough knowledge in the core concepts of cyber and information security technologies
- The candidate possesses thorough knowledge in the primitives of cryptology
- The candidate possesses knowledge about theory and scientific methods relevant to cryptology
- The candidate possesses basic knowledge in the theory and application of network security
- The candidate has thorough knowledge in the theory and methods in authentication and identification as well as general access control mechanisms
- The candidate will possess knowledge in the area of vulnerabilities and attack mechanisms and methods against cyber and information security systems
- The candidate possesses basic knowledge about integrated system security
- The candidate is capable of finding and performing critical analysis of various literature sources and applying them in structuring and formulating scientific reasoning in any of the topics of this course
- The candidate is capable of analyzing existing theories, methods, and interpretations in any of the fields in this course, and work independently on solving theoretical and practical problems.
- The candidate can plan and conduct a limited guided research exercise based on primary literature
- The candidate is capable of independent working and are familiar with core concepts and problems in the area of cyber and information security technology
- The candidate is capable of discussing issues in the field of cyber and information security technology with specialists, decision makers and a general audience
- The candidate is capable to translate the concepts and ideas of cyber and information security technology to other fields, both inside and outside of general information security
- The candidate is able to identify advanced information security technology related problems and to contribute with approaches to solve these
- Bases of Crypto
- Bases of Network Security
- Authentication and Identification
- Access Control Models
- Attack / Defend Scenarios
- Bases of Integrated System Security
Teaching Methods (additional text)
The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement. The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through the university’s learning management system.
Form(s) of Assessment
Form(s) of Assessment (additional text)
The overall grade is based on a grade for a final, written exam (3 hrs) as well as a grade for mandatory exercises.
The final, written exam will count for 60% while the exercises count for 40% of the final grade.
Both parts will be graded on a 0-100 scale and must be passed with at least 40 out of 100 points in order to pass the course. The final grade is the weighted average of the part scores and the 0-100 scale score of the final grade will be converted to the A-F scale according to recommended conversion table. In specific circumstances, can the course responsible slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale.
Alphabetical Scale, A(best) – F (fail)
Evaluated by internal examiner, external examiner is used periodically every fifth year, first time fall 2018.
Re-sit only possible the next time the course is running.
Code D: No printed or hand-written support material is allowed. A specific basic calculator is allowed.
Read more about permitted examination aids.
Books/standards, conference/journal papers and web resources, such as:
- W. Stallings & L. Brown: "Computer Security - Principles and practice", 3. edition (Global edition): Picture of cover page attached (ISBN-10:1-292-06617-2, ISBN-13: 978-1-292-06617-2)
- A. Menezes: “Handbook of Applied Cryptography”, http://cacr.uwaterloo.ca/hac/
- D. Gollmann: “Computer Security”, 3rd edition Wiley, 2011
- M. Bishop: ”Computer Security: Art and Science”. Addison-Wesley, 2003
- R. Anderson: “Security Engineering: A Guide to Building Dependable Distributed Systems (2nd edition)”, John Wiley & Sons, 2008
Other recommended reading material will be made available to the students during the course.
Replacement course for
IMT4561 Applied information security