2023/2024 BA-BINTV2010U Cybersecurity and Privacy
English Title | |
Cybersecurity and Privacy |
Course information |
|
Language | English |
Course ECTS | 7.5 ECTS |
Type | Elective |
Level | Bachelor |
Duration | One Semester |
Start time of the course | Autumn |
Timetable | Course schedule will be posted at calendar.cbs.dk |
Max. participants | 50 |
Study board |
Study Board for BSc/MSc in Business Administration and
Information Systems, BSc
|
Course coordinator | |
|
|
Main academic disciplines | |
|
|
Teaching methods | |
|
|
Last updated on 05-07-2023 |
Relevant links |
Learning objectives | ||||||||||||||||||||||||
Upon completion of the course, the student is
able to:
|
||||||||||||||||||||||||
Course prerequisites | ||||||||||||||||||||||||
None | ||||||||||||||||||||||||
Prerequisites for registering for the exam (activities during the teaching period) | ||||||||||||||||||||||||
Number of compulsory
activities which must be approved (see section 13 of the Programme
Regulations): 2
Compulsory home
assignments
The students have to get 2 out of 3 assignments approved. Each assignment is 3-5 pages. One of the assignments is individual and the other two assignments are group-based (group size: minimum 2 and maximum 4 students). There will not be any extra attempts provided to the students before the ordinary exam. If a student cannot hand in due to documented illness, or if a student does not get the activity approved in spite of making a real attempt, then the student will be given one extra attempt before the re-exam. Before the re-exam, there will be one home assignment (max. 10 pages) which will cover 2 mandatory assignments. |
||||||||||||||||||||||||
Examination | ||||||||||||||||||||||||
|
||||||||||||||||||||||||
Course content, structure and pedagogical approach | ||||||||||||||||||||||||
Individuals and organizations in the modern society depend on computer networks – the so-called Internet. But with this dependency comes vulnerabilities from failures, threats and attacks, and the potential for loss or misappropriation of important data.
This course provides students with a business background with knowledge and understanding of the Internet and the potential threats to individual and organizational security and privacy in our heavily interconnected IT systems. It also provides the students with knowledge about potential countermeasures and how to apply them.
The course combines technical and managerial perspectives on cybersecurity and privacy. It covers the structure and functionality of the Internet, basic cryptography, as well as organizational and managerial aspects of information security and privacy.
Course Structure: The first part of the course covers key concepts including computer networks, CIA, and threats and attacks (e.g., ransomware, denial-of-service, social engineering, etc.) along with technical protection mechanisms (e.g., cryptographic methods, firewalls, intrusion detection and prevention systems, etc.) and managerial security practices (e.g., security policy, staffing, access control models, etc.). The second part of the course covers key concepts in privacy (e.g., privacy concerns, law and ethics, surveillance capitalism, economics of privacy, privacy decision making, etc.) and covers practical implications at the individual, organizational, and governmental level.
The course requires no prior knowledge of IT or computer networks. Technical concepts and terms are introduced with comprehensive explanations and demonstrated with hands-on exercises. |
||||||||||||||||||||||||
Description of the teaching methods | ||||||||||||||||||||||||
The course involves various pedagogical method including lectures, simulation games, hands-on activities, documentaries, presentations, and case discussions. | ||||||||||||||||||||||||
Feedback during the teaching period | ||||||||||||||||||||||||
The following feedback is offered:
• Question and answer sessions during lectures. • Exercises, where the students will get feedback on their work and answers to exercise questions. • Feedback to mandatory assignments. • Individual consultations during office hours. |
||||||||||||||||||||||||
Student workload | ||||||||||||||||||||||||
|
||||||||||||||||||||||||
Expected literature | ||||||||||||||||||||||||
The literature can be changed before the semester starts. Students are advised to find the final literature on Canvas before buying any material.
Whitman, M. E., and Mattord, H. J. (2018). Management of Information Security, 6th Edition, Cengage Learning, Inc. Kurose, J., and Ross, K. W., (2017). Computer networking : a top-down approach, 7th ed, Pearson. (excerpts) |