course-details-portlet

IMT4113

Introduction to Cyber and Information Security Technology

New from the academic year 2016/2017

Credits 7.5
Level Second degree level
Course start Autumn 2016
Duration 1 semester
Language of instruction English
Examination arrangement Portfolio assessment , Written exam and Project work

About

About the course

Course content

Bases of Crypto

Bases of Network Security

Authentication and Identification

Access Control Models

Attack / Defend Scenarios

Bases of Integrated System Security

Learning outcome

Knowledge:

The candidate will have a thorough knowledge in the core concepts of cyber and information security technologies

The candidate possesses thorough knowledge in the primitives of cryptology

The candidate possesses knowledge about theory and scientific methods relevant to cryptology

The candidate possesses basic knowledge in the theory and application of network security

The candidate has thorough knowledge in the theory and methods in authentication and identification as well as general access control mechanisms

The candidate will possess knowledge in the area of vulnerabilities and attack mechanisms and methods against cyber and information security systems

The candidate possesses basic knowledge about integrated system security

Skills:

The candidate is capable of finding and performing critical analysis of various literature sources and applying them in structuring and formulating scientific reasoning in any of the topics of this course

The candidate is capable of analyzing existing theories, methods, and interpretations in any of the fields in this course, and work independently on solving theoretical and practical problems.

The candidate can plan and conduct a limited guided research exercise based on primary literature

General competence:

The candidate is capable of independent working and are familiar with core concepts and problems in the area of cyber and information security technology

The candidate is capable of discussing issues in the field of cyber and information security technology with specialists, decision makers and a general audience

The candidate is capable to translate the concepts and ideas of cyber and information security technology to other fields, both inside and outside of general information security

The candidate is able to identify advanced information security technology related problems and to contribute with approaches to solve these

Learning methods and activities

Forelesninger|Obligatoriske oppgaver

Utfyllende informasjon:

The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement. The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through the university¿s learning management system.

Further on evaluation

Utfyllende om kontinuasjon:

Re-sit only possible the next time the course is running.

Vurderingsformer:

The overall grade is based on a grade for a final, written exam (3 hrs) as well as a grade for mandatory exercises.The final, written exam will count for 60% while the exercises count for 40% of the final grade.Both parts will be graded on a 0-100 scale and must be passed with at least 40 out of 100 points in order to pass the course. The final grade is the weighted average of the part scores and the 0-100 scale score of the final grade will be converted to the A-F scale according to recommended conversion table. In specific circumstances, can the course responsible slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale.

Specific conditions

Admission to a programme of study is required:
Information Security (MIS)
Information Security (MISD)
Information Security (MISEB)

Course materials

Books/standards, conference/journal papers and web resources, such as:

W. Stallings & L. Brown: "Computer Security - Principles and practice", 3. edition (Global edition): Picture of cover page attached (ISBN-10:1-292-06617-2, ISBN-13: 978-1-292-06617-2)

A. Menezes: ¿Handbook of Applied Cryptography¿, http://cacr.uwaterloo.ca/hac/

D. Gollmann: ¿Computer Security¿, 3rd edition Wiley, 2011

M. Bishop: ¿Computer Security: Art and Science¿. Addison-Wesley, 2003

R. Anderson: ¿Security Engineering: A Guide to Building Dependable Distributed Systems (2nd edition)¿, John Wiley & Sons, 2008

Other recommended reading material will be made available to the students during the course.

Credit reductions

Course code Reduction From
IMT3771 2.5 sp
IMT4532 2.5 sp
IMT4561 3.7 sp
This course has academic overlap with the courses in the table above. If you take overlapping courses, you will receive a credit reduction in the course where you have the lowest grade. If the grades are the same, the reduction will be applied to the course completed most recently.

Subject areas

  • Information Security
  • Computer Science

Contact information

Course coordinator

  • Patrick Bours

Department with academic responsibility

Department of Information Security and Communication Technology

Examination

Examination

Examination arrangement: Portfolio assessment

Ordinary examination - Autumn 2016

Portfolio - written exam and exercises
Grade Letters Weighting 100/100

Examination arrangement: Written exam and Project work

Ordinary examination - Autumn 2016

Exercises
Grade Letters Weighting 4/10
Written examination
Grade Letters Weighting 6/10 Date 2016-12-12 Time 13:00 Duration 3 timer Place and room Not specified yet.