EPN-V2

STKD6310 Introduction to Information & Network Security II Course description

Course name in Norwegian
Introduction to Information & Network Security II
Study programme
International Summer School - Faculty of Technology, Art and Design
Weight
10.0 ECTS
Year of study
2017/2018
Programme description
Course history

Introduction

This course will introduce the concepts of information and network security. We will discuss in detail security services such as confidentiality, integrity, availability, authentication, nonrepudiation and access control. Students will be introduced to common threats and attacks to systems and networks whether they are intentional or unintentional. Lastly, we will discuss mitigations to common threats and attacks and how we can defend against them.

Required preliminary courses

No additional requirements to the general requirements for the summer-school.

Learning outcomes

After completing this course the student should have the following learning outcome:

Knowledge

On successful completion of this course the student has knowledge:

  • of the pertinent issues in information and network security
  • of the principles of confidentiality, integrity, availability, authentication, nonrepudiation and access control
  • of the common forms of information security threats and attacks
  • of biometrics and other statistical analyses of biological data to ensure security
  • of the methods for preventing data leaks and other unauthorized transfer of secured information

Skills

On successful completion of this course the student has the progressive ability to:

  • evaluate network security protocols
  • identify mechanisms for ensuring information and network security
  • analyse security incidents to produce security improvements
  • detect and prevent network intrusion
  • develop secure code

General competence

On successful completion of this course the student is proficient and can master:

  • ensuring information and network security
  • techniques for ensuring confidentiality, integrity, availability, authentication, nonrepudiation and access control to network systems
  • processes for regulatory compliance, audit and monitoring.

Teaching and learning methods

The course is structured to provide lectures and discussions. Real-world vulnerabilities and exploits will be discussed and shown how they apply to us in our day to day lives.

This course is a blended learning course that combines four weeks full time in-person instruction with eight weeks independent study, with online supervision when required. The four week in-person module culminates in an oral exam. Feedback from the oral exam acts as a basis for independent study, which then again culminates in a submission of the final report.

Course requirements

None.

Assessment

Project-examination. One individual 6,000 to 8,000 word term paper.

Exams can be appealed.

Grading scale

The final assessment, the group project, will be graded on a grading scale from A to E (A is the highest grade and E the lowest) and F for fail.

Examiners

Two internal examiners will be used.