2015/2016 KAN-CEBUV2022U IT Security
English Title | |
IT Security |
Course information |
|
Language | English |
Course ECTS | 7.5 ECTS |
Type | Elective |
Level | Full Degree Master |
Duration | One Semester |
Start time of the course | Autumn |
Timetable | Course schedule will be posted at calendar.cbs.dk |
Min. participants | 25 |
Max. participants | 40 |
Study board |
Study Board for BSc/MSc in Business Administration and
Information Systems, MSc
|
Course coordinator | |
|
|
Main academic disciplines | |
|
|
Last updated on 13-08-2015 |
Learning objectives | |||||||||||||||||||||||||||||||
To achieve the grade 12, students
should meet the following learning objectives with no or only minor
mistakes or errors: At the end of the course, the student should be
able to
• identify and explain main areas in IT security • compare and analyse technologies within IT-security • identify and evaluate threats, vulnerabilities and risk for a given system • perform a risk analysis In the case of mini project the student should either • carry out a small risk analysis of a given case/organisation • or analyse a given new security technology or security problem. |
|||||||||||||||||||||||||||||||
Course prerequisites | |||||||||||||||||||||||||||||||
The course requires a basic knowledge of math such as primes, modulus and exponentiation. Furthermore binary representation of numbers and characters should be understood. Knowledge of networking and TCP/IP is required. | |||||||||||||||||||||||||||||||
Prerequisites for registering for the exam | |||||||||||||||||||||||||||||||
Number of mandatory
activities: 2
Compulsory assignments
(assessed approved/not approved)
Two compulsory exercises (asessed approved/not approved) |
|||||||||||||||||||||||||||||||
Examination | |||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||
Course content and structure | |||||||||||||||||||||||||||||||
The field IT Security is a broad research area with
background in Computer Science, Math, Psychology and
Economics. The field is often used synonomous to Cyber Security
or Information Assurance, and spans problems within the
entire society from citizens through business to national security.
|
|||||||||||||||||||||||||||||||
Teaching methods | |||||||||||||||||||||||||||||||
The course will consist of lectures and exercises, complemented by one or two guest lectures. | |||||||||||||||||||||||||||||||
Student workload | |||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||
Expected literature | |||||||||||||||||||||||||||||||
Main text book
ISBN-13: 9781292066172
Lecture material and a list of literature will be provided at the web site for the course. Literature will mainly be taken from Internet. |