2014/2015 KAN-CIEBV2008U IT Security
English Title | |
IT Security |
Course information |
|
Language | English |
Course ECTS | 7.5 ECTS |
Type | Elective |
Level | Full Degree Master |
Duration | One Semester |
Course period | Autumn |
Timetable | Course schedule will be posted at calendar.cbs.dk |
Min. participants | 25 |
Max. participants | 40 |
Study board |
Study Board for BSc/MSc in Business Administration and
Information Systems, MSc
|
Course coordinator | |
|
|
Main academic disciplines | |
|
|
Last updated on 09-04-2014 |
Learning objectives | ||||||||||||||||||||||||||||||
At the end of the course, the student should be
able to
• identify and explain main areas in IT security • compare and analyse technologies within IT-security • identify and evaluate threats, vulnerabilities and risk for a given system • perform a risk analysis In the case of mini project the student should either • carry out a small risk analysis of a given case/organisation • or analyse a given new security technology or security problem. |
||||||||||||||||||||||||||||||
Course prerequisites | ||||||||||||||||||||||||||||||
The course requires a basic knowledge of math such as primes, modulus and exponentiation. Furthermore binary representation of numbers and characters should be understood. A minimum knowledge of networking and TCP/IP is required. | ||||||||||||||||||||||||||||||
Examination | ||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
Course content and structure | ||||||||||||||||||||||||||||||
The field of IT security – or rather Information
Communication Technology (ICT) security is a broad research field
rooted in computer science, math, psychology and economics. The
field covers issues like privacy, integrity, availability,
authentication and non repudiation, and spans problems within the
entire society from citizens through business to national security.
This course will give the student a fundamental understanding of some aspects of the field. Starting with an introduction to cryptology as a basic tool, the course will discuss authentication methods (OpenId etc.), access controls, privacy concerns, threats to network communication (e.g. Eavesdropping, Denial of Service attacks), malicious software. Finally the course will introduce organizational controls like risk management, security policies, and continuity planning to mitigate risks. The course could be use as a preparation for a subsequent CÍSSP certification. |
||||||||||||||||||||||||||||||
Teaching methods | ||||||||||||||||||||||||||||||
The course will consist of lectures and exercises, complemented by one or two guest lectures. | ||||||||||||||||||||||||||||||
Student workload | ||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||
Further Information | ||||||||||||||||||||||||||||||
Changes in course schedule may occur
Monday 08.00-11.30, week 36-41, 43-48 |
||||||||||||||||||||||||||||||
Expected literature | ||||||||||||||||||||||||||||||
Lecture material and a list of literature will be
provided at the web site for the course
Main text book Computer Security: Principles and Practices: International Edition, 2/E William Stallings and Lawrie Brown, Pearson Higher Education. |
Last updated on
09-04-2014