2016/2017 KAN-CEBUV2022U IT Security
English Title | |
IT Security |
Course information |
|
Language | English |
Course ECTS | 7.5 ECTS |
Type | Elective |
Level | Full Degree Master |
Duration | One Semester |
Start time of the course | Autumn |
Timetable | Course schedule will be posted at calendar.cbs.dk |
Min. participants | 25 |
Max. participants | 40 |
Study board |
Study Board for BSc/MSc in Business Administration and
Information Systems, MSc
|
Course coordinator | |
|
|
Main academic disciplines | |
|
|
Last updated on 23-08-2016 |
Learning objectives | |||||||||||||||||||||||||||||||||
To achieve the grade 12, students
should meet the following learning objectives with no or only minor
mistakes or errors: At the end of the course, the student should be
able to
• identify and explain main areas in IT security • compare and analyse technologies within IT-security • identify and evaluate threats, vulnerabilities and risk for a given system • perform a basic risk analysis In the case of mini project the student should either • carry out a small risk analysis of a given case/organisation, or • analyse a given new security technology or security problem. |
|||||||||||||||||||||||||||||||||
Course prerequisites | |||||||||||||||||||||||||||||||||
The course requires a basic knowledge of math such as primes, modulus and exponentiation. Furthermore binary representation of numbers and characters should be understood. Knowledge of networking and TCP/IP is required. | |||||||||||||||||||||||||||||||||
Prerequisites for registering for the exam | |||||||||||||||||||||||||||||||||
Number of mandatory
activities: 2
Compulsory assignments
(assessed approved/not approved)
Two compulsory exercises (asessed approved/not approved) |
|||||||||||||||||||||||||||||||||
Examination | |||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||
Course content and structure | |||||||||||||||||||||||||||||||||
This course will give the student a fundamental understanding of the main subjects of the field. IT security is a huge field easily covering a full master. However, in this course the field is compressed into one semester. Starting with an introduction to cryptology as a basic tool, the course will discuss authentication methods (OpenId etc.), access controls, privacy concerns, threats to network communication (e.g. Eavesdropping, Denial of Service attacks), malicious software and cyber threats. Finally the course will introduce organizational measures like risk management, security policies, and continuity planning to mitigate risks. With an American expression the course is “two inches deep and a mile wide”. |
|||||||||||||||||||||||||||||||||
Teaching methods | |||||||||||||||||||||||||||||||||
The course will consist of lectures and exercises, complemented by one or two guest lectures. | |||||||||||||||||||||||||||||||||
Student workload | |||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||
Expected literature | |||||||||||||||||||||||||||||||||
Main text book
ISBN-13: 9781292066172
Lecture material and a list of literature will be provided at the web site for the course. |