Objectives and competences
The objective of this course is for students to be able to understand the concepts of protecting information systems and communications, be able to identify cyber threats and develop and implement security mechanisms on selected information systems or services
Content (Syllabus outline)
• Principles and goals of cybersecurity.
• Cryptography basics: the concepts of cryptography, the role of cryptography in information security; technologies, building blocks and approaches of protection.
• The public key infrastructure: concepts, building blocks, digital certificates and electronic signatures.
• Malware and internet scams.
• Network security: risks and attacks, security protocols, other means of protection.
• Web security: web security model, web applications and web session security.
• Secure architectures: security of architectural components.
• Planning of security requirements and measures, and user aspects of security: privacy; standards; security policies; analysis of security risks.
Learning and teaching methods
• lectures
• computer exercises
• project work
• individual work
Intended learning outcomes - knowledge and understanding
• identify and understand cybersecurity risks
• explain principles of the operation of protection mechanisms
• analyse cybersecurity risks
• analyse security requirements
• implement security mechanisms and measures
• deploy security mechanisms and measures
Intended learning outcomes - transferable/key skills and other attributes
• Communication skills: writing a professional report on a project, oral defence of laboratory exercises, written expression in a written examination.
• Use of information technology: searching for information on the Internet, use and development of software solutions to protect information systems.
• Problem-solving: solving a specific problem using a software solution and designing and implementing a cybersecurity solution.
Readings
• Stallings, W., & Brown, L. (2018). Computer security: principles and practice (4th ed., global ed., p. 800). Pearson.
• Easttom, C. (2016). Computer security fundamentals (3rd ed., p. XVIII, 426). Pearson.
Prerequisits
Recommended knowledge/understanding of informatics and programming.
Additional information on implementation and assessment The written exam may be substituted with continuous knowledge testing and assessment.