2022/2023 BA-BINTV2008U Internet and Cybersecurity
English Title | |
Internet and Cybersecurity |
Course information |
|
Language | English |
Course ECTS | 7.5 ECTS |
Type | Elective |
Level | Bachelor |
Duration | One Semester |
Start time of the course | Autumn |
Timetable | Course schedule will be posted at calendar.cbs.dk |
Max. participants | 50 |
Study board |
Study Board for BSc/MSc in Business Administration and
Information Systems, BSc
|
Course coordinator | |
|
|
Main academic disciplines | |
|
|
Teaching methods | |
|
|
Last updated on 11-05-2022 |
Relevant links |
Learning objectives | ||||||||||||||||||||||
Upon completion of the course, the student
|
||||||||||||||||||||||
Course prerequisites | ||||||||||||||||||||||
None | ||||||||||||||||||||||
Prerequisites for registering for the exam (activities during the teaching period) | ||||||||||||||||||||||
Number of compulsory
activities which must be approved (see section 13 of the Programme
Regulations): 2
Compulsory home
assignments
The students have get 2 out of 3 assignments approved. Each assignment is 3-5 pages. there are one individual assignment and two assignments written in groups. There will not be any extra attempts provided to the students before the ordinary exam. If a student cannot hand in due to documented illness, or if a student does not get the activity approved in spite of making a real attempt, then the student will be given one extra attempt before the re-exam. Before the re-exam, there will be one home assignment (max. 10 pages) which will cover 2 mandatory assignments. |
||||||||||||||||||||||
Examination | ||||||||||||||||||||||
|
||||||||||||||||||||||
Course content, structure and pedagogical approach | ||||||||||||||||||||||
Individuals and organizations in the modern society depend on computer networks – the so-called Internet. But with this dependency comes vulnerabilities from failures, threats and attacks, and the potential for loss or misappropriation of important data. This course provides students with a business background with knowledge and understanding of the Internet and the potential threats to individual and organizational security and privacy in our heavily interconnected IT systems. It also provides the students with knowledge about potential countermeasures and how to apply them. The course combines technical and managerial perspectives on cybersecurity and privacy. It covers the structure and functionality of the Internet, basic cryptography, as well as organizational and managerial aspects of information security and privacy. The course requires no prior knowledge of IT or computer networks. Technical concepts and terms are introduced with comprehensive explanations and demonstrated with hands-on exercises. |
||||||||||||||||||||||
Description of the teaching methods | ||||||||||||||||||||||
The first part of the course introduces the
basics of computer networks, the technical cybersecurity landscape,
cyber threats (e.g., eavesdropping, ransomware, denial-of-service
attacks, etc.), and cryptography at a high level. The second part
of the course will cover personal and organizational aspects of
cyber threats (e.g., social engineering techniques), and
countermeasures (e.g., security policy, staffing, access control
models, etc.).
The course includes lectures, simulation games, hands-on activities, and case discussions. |
||||||||||||||||||||||
Feedback during the teaching period | ||||||||||||||||||||||
The following feedback is offered:
• Question and answer sessions during lectures • Exercises, where the students will get feedback on their work and answers to exercise questions • Feedback to mandatory assignments • Individual consultations during office hours. |
||||||||||||||||||||||
Student workload | ||||||||||||||||||||||
|
||||||||||||||||||||||
Expected literature | ||||||||||||||||||||||
The literature can be changed before the semester starts. Students are advised to find the final literature on Canvas before buying any material.
Kurose, J., and Ross, K. W., (2017). Computer networking : a top-down approach, 7th ed, Pearson. (excerpts) |