Computer Security, 6 credits
Datasäkerhet, 6 hp
TSIT02
Main field of study
Information Technology Computer Science and Engineering Computer ScienceCourse level
First cycleCourse type
Programme courseExaminer
Guilherme B XavierDirector of studies or equivalent
Klas NordbergEducation components
Preliminary scheduled hours: 28 hRecommended self-study hours: 132 h
Available for exchange students
YesMain field of study
Information Technology, Computer Science and Engineering, Computer ScienceCourse level
First cycleAdvancement level
G2XCourse offered for
- Computer Science, Master's Programme
- Mathematics, Master's Programme
- Mathematics
- Computer Science and Engineering, M Sc in Engineering
- Industrial Engineering and Management - International, M Sc in Engineering
- Industrial Engineering and Management, M Sc in Engineering
- Information Technology, M Sc in Engineering
- Computer Science and Software Engineering, M Sc in Engineering
- Applied Physics and Electrical Engineering - International, M Sc in Engineering
- Applied Physics and Electrical Engineering, M Sc in Engineering
Entry requirements
Note: Admission requirements for non-programme students usually also include admission requirements for the programme and threshold requirements for progression within the programme, or corresponding.
Prerequisites
At least one course in basic computer science, and some knowledge on operating systems and computer communications.Intended learning outcomes
After completing the course the student should be able to describe safety issues arising from the use of computers and modern network technologies, and the opportunities to protection available today. This means that after completing this course the student is expected to be able to:
- Describe the principles and possibilities of how security can be built into computers and networks, both at the component and system level
- Explain the concept that confidentiality, integrity and availability (CIA) of information and its use in data security
- Describe the common security protocols in network communications
- Describe the usual models of access control and user authentication
- Describe the use of cryptography-based tools
Course content
Structure and terminology of the subject. Authentication of user identity. Theory and practice for access control. Formal security models. Cryptology and its use in security tools. Security problems, tools, protocols and solutions in networks and distributed systems. Security in specific systems such as databases. Security management.
Teaching and working methods
The course consists of lectures, seminars and laboratory work.
Examination
LAB1 | Laboratory work | 1 credits | U, G |
TEN1 | Written examination | 5 credits | U, 3, 4, 5 |
Grades
Four-grade scale, LiU, U, 3, 4, 5Department
Institutionen för systemteknikDirector of Studies or equivalent
Klas NordbergExaminer
Guilherme B XavierCourse website and other links
http://www.icg.isy.liu.se/courses/tsit02/Education components
Preliminary scheduled hours: 28 hRecommended self-study hours: 132 h
Course literature
Additional literature
Books
- Ross Anderson, (2008) Security Engineering 2nd ed Wiley
Code | Name | Scope | Grading scale |
---|---|---|---|
LAB1 | Laboratory work | 1 credits | U, G |
TEN1 | Written examination | 5 credits | U, 3, 4, 5 |
Regulations (apply to LiU in its entirety)
The university is a government agency whose operations are regulated by legislation and ordinances, which include the Higher Education Act and the Higher Education Ordinance. In addition to legislation and ordinances, operations are subject to several policy documents. The Linköping University rule book collects currently valid decisions of a regulatory nature taken by the university board, the vice-chancellor and faculty/department boards.
LiU’s rule book for education at first-cycle and second-cycle levels is available at http://styrdokument.liu.se/Regelsamling/Innehall/Utbildning_pa_grund-_och_avancerad_niva.
Additional literature
Books
Note: The course matrix might contain more information in Swedish.
I | U | A | Modules | Comment | ||
---|---|---|---|---|---|---|
1. DISCIPLINARY KNOWLEDGE AND REASONING | ||||||
1.1 Knowledge of underlying mathematics and science (G1X level) |
|
|
X
|
LAB1
|
||
1.2 Fundamental engineering knowledge (G1X level) |
X
|
X
|
X
|
TEN1
|
||
1.3 Further knowledge, methods, and tools in one or several subjects in engineering or natural science (G2X level) |
X
|
X
|
|
TEN1
|
||
1.4 Advanced knowledge, methods, and tools in one or several subjects in engineering or natural sciences (A1X level) |
|
|
|
|||
1.5 Insight into current research and development work |
|
|
|
|||
2. PERSONAL AND PROFESSIONAL SKILLS AND ATTRIBUTES | ||||||
2.1 Analytical reasoning and problem solving |
|
|
X
|
LAB1
|
||
2.2 Experimentation, investigation, and knowledge discovery |
|
|
|
|||
2.3 System thinking |
|
|
|
|||
2.4 Attitudes, thought, and learning |
|
X
|
X
|
LAB1
TEN1
|
||
2.5 Ethics, equity, and other responsibilities |
|
|
|
|||
3. INTERPERSONAL SKILLS: TEAMWORK AND COMMUNICATION | ||||||
3.1 Teamwork |
|
|
X
|
LAB1
|
||
3.2 Communications |
|
|
X
|
LAB1
|
||
3.3 Communication in foreign languages |
|
|
X
|
TEN1
|
||
4. CONCEIVING, DESIGNING, IMPLEMENTING AND OPERATING SYSTEMS IN THE ENTERPRISE, SOCIETAL AND ENVIRONMENTAL CONTEXT | ||||||
4.1 External, societal, and environmental context |
|
X
|
|
TEN1
|
||
4.2 Enterprise and business context |
|
X
|
|
TEN1
|
||
4.3 Conceiving, system engineering and management |
|
X
|
|
TEN1
|
||
4.4 Designing |
|
X
|
|
|||
4.5 Implementing |
|
|
|
|||
4.6 Operating |
|
|
|
|||
5. PLANNING, EXECUTION AND PRESENTATION OF RESEARCH DEVELOPMENT PROJECTS WITH RESPECT TO SCIENTIFIC AND SOCIETAL NEEDS AND REQUIREMENTS | ||||||
5.1 Societal conditions, including economic, social, and ecological aspects of sustainable development for knowledge development |
|
|
|
|||
5.2 Economic conditions for knowledge development |
|
|
|
|||
5.3 Identification of needs, structuring and planning of research or development projects |
|
|
|
|||
5.4 Execution of research or development projects |
|
|
|
|||
5.5 Presentation and evaluation of research or development projects |
|
|
|
This tab contains public material from the course room in Lisam. The information published here is not legally binding, such material can be found under the other tabs on this page.
There are no files available for this course.