IMT6011 - Introduction to Information Security


Examination arrangement

Examination arrangement: Assignment
Grade: Passed / Not Passed

Evaluation Weighting Duration Grade deviation Examination aids
Assignment 67/100
Assignment 33/100

Course content

-Key results in the theory and modelling of information security -Network security -Operating system security -Human factors in security -Security engineering and assurance -Cyber-physical systems security -Cryptography and cryptanalysis -Database security -Information security management -Anonymity and privacy

Learning outcome

The module (mandatory for doctoral students in the programme) is intended to provide additional insights into the information security domain for doctoral students in Information Security beyond their immediate area of specialisation.To this end two areas of information security that are distinct from the candidate's specialisation are to be identified, where the two areas should normally also not overlap. For each area (including but not limited to those identified below), a sub-area is to be chosen, and primary and secondary literature to be studied to elaborate a seminar paper. In one of the areas, the sub-area chosen should be such that a reasonable overview of the state of the art in the research specialisation can be achieved and described, whilst a second area may follow a somewhat wider remit and rely more on secondary literature. The results will be a synopsis and survey of the two respective sub-areas, combined with individual perspective and reflection by the candidate.

Skills: On concluding the module, candidates -can identify relevant primary and secondary research literature in the respective areas chosen by the candidate, forming an insight into the state of the art in an unfamiliar area -can synthesise the state of the art and articulate key research problems and methods in the respective areas chosen by the candidate -are able to evaluate the merits and contributions of research articles in the respective areas chosen by the candidate

Knowledge: On concluding the module, candidates -will be able to summarise the state of the art in the respective areas chosen by the candidate -can outline key methods employed by research in the respective areas chosen by the candidate and state relative merits -can identify main strands of inquiry and key results in the respective areas chosen by the candidate

General Competence: On concluding the module, candidates -can appraise the merit of research methods and quality of research in the sub-areas studied also in relation to the candidate's own specialisation area -is able to cogently discuss the state of the art in the chosen areas for the seminar papers -is able to identify gaps in the state of the art in the respective areas chosen by the candidate

Sustainability will be mandatorily considered as part of the individual reports.

Learning methods and activities

-Lectures -Individual discussions -Seminars -Literature study Compulsory requirements: -Students are required to prepare a term paper on one of the subject areas covered in the course in coordination with and approved by the lecturer and must provide a presentation of results and findings in a seminar. -The delivery date for the term paper is arranged individually to match the seminar schedule.

Further on evaluation

Re-sit: New seminar papers must be provided. Forms of assessment: -Two seminar papers are to be provided by the candidate and are marked separately by the examiner on a Pass/Fail scale. -Both papers must be completed successfully to secure an overall Pass grade.

Specific conditions

Admission to a programme of study is required:
Information Security and Communication Technology (PHISCT)

Course materials

The textbooks, monographs, and research articles are determined by the respective sub-area chosen for the seminar papers and will normally need to reflect the state of the art in the area. The following identifies a small number of seminal papers and texts in selected areas only. Suggested textbooks: -O. Goldreich: Foundations of Cryptography (2 vols.), Cambridge University Press, 2001-2004 -W. Diffie and M. Hellman: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6):644-654 (1976) -R. L. Rivest, A. Shamir,, and L. Adleman: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2):120-126 (1978) -E. Bertino and R. Sandhu: Database Security - Concepts, Approaches, and Challenges. IEEE Transactions on Dependable and Secure Computing 2(1):2-19 (2005) -J. Vaidya and C. Clifton: Privacy-Preserving Decision Trees over Vertically Partitioned Data. ACM Transactions on Knowledge Discovery from Data 2(3):14 (2008) -K. Thompson: Reflections on Trusting Trust Communications of the ACM 27(8):761-763 (1984) -J. Feigenbaum, A. Johnson, and P. Syverson: A Model of Onion Routing with Provable Anonymity" Proceedings of the 11th International Conference Financial Cryptography and Data Security (FC 2007), Vol. 4886 of Lecture Notes in Computer Science. Trinidad/Tobago, Feb. 2007, Springer-Verlag. -E. Peeters, F.-X. Standaert, and J.-J. Quisquater: Power and Electromagnetic Analysis: Improved Model, Consequences, and Comparisons Integration: The VLSI Journal 40(1):52-60 (2007) -D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi: The EM Side-Channel(s) Proceedings of Cryptographic Hardware and Embedded Systems (CHES 2002), Vol. 2523 of Lecture Notes in Computer Science, Lausanne, Switzerland, Sep. 2002, Springer-Verlag. -A. Mishra: Security and Quality of Service in Ad Hoc Wireless Networks, Cambridge University Press, 2010 -S.K. Das, K. Kant, N. Zhang: Handbook on Securing Cyber-Physical Critical Infrastructure. Elsevier, 2012

More on the course



Version: 1
Credits:  5.0 SP
Study level: Doctoral degree level


Term no.: 1
Teaching semester:  AUTUMN 2023

Term no.: 1
Teaching semester:  SPRING 2024

Language of instruction: English

Location: Gjøvik

Subject area(s)
  • Information Security
  • Informatics
Contact information
Course coordinator:

Department with academic responsibility
Department of Information Security and Communication Technology


Examination arrangement: Assignment

Term Status code Evaluation Weighting Examination aids Date Time Examination system Room *
Autumn ORD Assignment 67/100
Room Building Number of candidates
Autumn ORD Assignment 33/100


Room Building Number of candidates
Spring ORD Assignment 67/100
Room Building Number of candidates
Spring ORD Assignment 33/100


Room Building Number of candidates
  • * The location (room) for a written examination is published 3 days before examination date. If more than one room is listed, you will find your room at Studentweb.

For more information regarding registration for examination and examination procedures, see "Innsida - Exams"

More on examinations at NTNU