Course - Introduction to informations security and privacy - IIKG3000
Introduction to informations security and privacy
About
About the course
Course content
The way systems are developed and operated is changing. Professionals who, in the past, might have been regarded as conventional end-users, now play a role in the development and operation of information systems. Contemporary engineers and scientists are now expected to possess a range of information technology skills. For example, they are expected to use these skills to build a web-based front end for their application, to interact with and control IoT devices, to integrate with third-party services and infrastructure, or to leverage data as a commodity. With these everyday skills comes a responsibility to ensure that security and privacy concerns are adequately considered in the systems that they build and work with. However, we see many public examples of where this does not happen: security and privacy breaches are reported for information systems, medical devices, industrial control systems, and more.
The objective of this introductory course is to provide a basic competence in a selection of contemporary information security and privacy topics. It is intended for students who expect to play a role in the development and operation of information systems.
Learning outcome
After having completed the course the student will have have aquired the following learing outcomes in terms of knowledge, skills and general competence:
Knowledge:
- Has broad knowledge of important topics, theories, issues, processes, tools and methods within information security and privacy
- Is familiar with research and development work in information security and privacy
- Can update his/her knowledge in information security and privacy
- Has knowledge of the history, traditions, distinctive character and place in society of the academic field.
Skills:
- Can apply academic knowledge and relevant results of research and development work in information security and privacy to practical and theoretical problems within other domains and make well-founded choices
- Can reflect upon his/her own academic practice and adjust it under supervision
- Can find, evaluate and refer to information and scholarly subject matter and present it in a manner that sheds light on the problem
- Masters relevant scholarly tools, techniques and forms of communication
General Competence
- Can analyse relevant academic, professional and research ethical problems
- Can apply his/her knowledge and skills in new areas in order to carry out advanced assignments and projects
- Can communicate extensive independent work and masters language and terminology of the academic field
- Can communicate about academic issues, analyses and conclusions in the field, both with specialists and the general public
- Can evaluate and respond to peers' ideas and opinions, actively engaging in discussions with team members in a constructive manner to foster a shared understanding or collective viewpoint
- Can contribute with perspectives related to information security and privacy in new thinking and innovation processes
Learning methods and activities
The course is based on a combination of lectures, team work, and self-defined project work. The students are encouraged to work on topics related to their primary interest field with a focus on technological and non-technological challenges related to information security and privacy. Students must create a digital presentation and a written report on information security topics, as well as conduct a peer review of their classmates' work.
The course is based on Blackboard as the digital learning platform, combined with physical gatherings. Participants will be divided into teams, with real-time team participation expected. When feasible, the Team-Based Learning (TBL) approach will be implemented to encourage active learning and team discussions. The coursework can be completed individually or in groups (separate from the structured teams mentioned above) and must be documented as a portfolio, focusing on self-selected topics within information security and privacy.
The learning activities include:
- Team-Based Learning (TBL) (individual learning, team learning, instructor’s feedback, lectures)
- One plenary coursework presentation (individual or in groups)
- Experience exchange in plenary settings
- Written course report (individual or in groups)
This is a multi-campus course. TBL and lectures will be partially organized on all NTNU campus with active student in the course, and partially online.
Further on evaluation
The portfolio consists of
- Presentation for coursework topic I (individual or in groups, assessed by course teachers) (30%)
- Written report for coursework topic II (individual or in groups, assessed by course teachers) (70%)
Portfolio assessment failure implies a course retake.
Recommended previous knowledge
Recommend as K-course for integrated 5 years master educations and elective course for 3 years engineering educations.
Course materials
- M. Whitman og H. Mattord: Principles of Information Security, CENGAGE, 7. Utgave, 2021
- Distributed material
Credit reductions
Course code | Reduction | From |
---|---|---|
TDT4237 | 2.5 sp | Autumn 2021 |
IMT4113 | 2.5 sp | Autumn 2021 |
DCSG1002 | 5 sp | Autumn 2021 |
DCST1002 | 5 sp | Autumn 2021 |
Subject areas
- Information Security
Contact information
Course coordinator
Lecturers
Department with academic responsibility
Department of Information Security and Communication Technology