Information Security, Second Course, 6 credits
Informationssäkerhet, fk, 6 hp
TDDD17
Main field of study
Information Technology Computer Science and Engineering Computer ScienceCourse level
Second cycleCourse type
Programme courseExaminer
Nahid ShahmehriDirector of studies or equivalent
Patrick LambrixEducation components
Preliminary scheduled hours: 55 hRecommended self-study hours: 105 h
Available for exchange students
YesMain field of study
Information Technology, Computer Science and Engineering, Computer ScienceCourse level
Second cycleAdvancement level
A1XCourse offered for
- Computer Science and Engineering, M Sc in Engineering
- Industrial Engineering and Management - International, M Sc in Engineering
- Industrial Engineering and Management, M Sc in Engineering
- Computer Science, Master's programme
- Information Technology, M Sc in Engineering
- Computer Science and Software Engineering, M Sc in Engineering
Entry requirements
Note: Admission requirements for non-programme students usually also include admission requirements for the programme and threshold requirements for progression within the programme, or corresponding.
Prerequisites
Basic course in computer security. Basic understanding of operating system concepts and TCP/IP networks is recommended. Students are expected to be able to produce written reports of high quality.
Intended learning outcomes
The course provides deeper studies in selected topics in the area of information security. After passing the course, a student should be able to:
- General goals:
- Explain and use the security terminology and security principles presented at the course.
- Identify and explain in detail the security threats against a certain system, in a given context; identify vulnerabilities of systems, and formulate security requirements.
- Analyze and structure a given security problem.
- Find, evaluate, and explain in detail solutions to security problems, in general and in specific contexts.
- Synthesize partial solutions towards addressing given security problems.
- Generalize and synthesize information from multiple types of sources in the information security area to find structure, internal and external connections, and draw original and well-motivated conclusions.
- Map abstract concepts and models to real security problems and mechanisms, and vice versa.
- Project specific goals:
- Identify, motivate, analyze, and structure the problems to be addressed in the project.
- Find, evaluate, and explain solutions to problems identified in the project.
- Use and understand the equipment (hardware and software) needed to perform the project. Apply existing security tools to address a given problem, and develop new tools and mechanisms.
- Find, synthesize, and present information from multiple types of sources in the information security area to find structure, internal and external connections, and make original and well-motivated conclusions.
- Present project results to an audience with similar general background in information security.
- Plan, follow up, and document the project work.
Course content
- Part 1: This part deals with theory and is based on lectures and a literature study. The detailed contents can vary from year to year based on the current research in the field and the ongoing research at LiU. Topics may include: security mechanisms for modern communication systems (e.g. fingerprinting and watermarking), network security (e.g. security in IEEE 802.11), system and software integrity (e.g. covert channels, buffer overflow, and viruses), modern identification and authentication mechanisms (e.g. biometric authentication), security standards (e.g. Common Criteria) and analysis methodologies (e.g. Fault Tree Analysis), and standards and common implementations in the field (e.g. access control in Radio Access Networks).
- Part 2: In this part students will perform projects, which can be of theoretical or practical nature. The subjects of the projects will be from the topics studied in part 1 or other topics within the field.
Teaching and working methods
The course consists of two parts, an overview part and an individual deeper studies part. The overview consists mainly of lectures and a study of literature. The deeper studies consist of a project in a sub-field of information security. For the project, students will work in teams.
The course runs over the entire spring semester.
Examination
LAB2 | Laboratory work and written assignments | 1 credits | U, G |
UPG2 | Written report. Ends with a common seminar day. | 2 credits | U, G |
TEN2 | Written examination | 3 credits | U, 3, 4, 5 |
LAB1 gives bonus points on TEN1 during the same year
Grades
Four-grade scale, LiU, U, 3, 4, 5Department
Institutionen för datavetenskapDirector of Studies or equivalent
Patrick LambrixExaminer
Nahid ShahmehriCourse website and other links
http://www.ida.liu.se/~TDDD17/Education components
Preliminary scheduled hours: 55 hRecommended self-study hours: 105 h
Course literature
M. Bishop, "Computer Security: Art and Science" samt artikelsamling (se kurshemsidan).Code | Name | Scope | Grading scale |
---|---|---|---|
LAB2 | Laboratory work and written assignments | 1 credits | U, G |
UPG2 | Written report. Ends with a common seminar day. | 2 credits | U, G |
TEN2 | Written examination | 3 credits | U, 3, 4, 5 |
LAB1 gives bonus points on TEN1 during the same year
Regulations (apply to LiU in its entirety)
The university is a government agency whose operations are regulated by legislation and ordinances, which include the Higher Education Act and the Higher Education Ordinance. In addition to legislation and ordinances, operations are subject to several policy documents. The Linköping University rule book collects currently valid decisions of a regulatory nature taken by the university board, the vice-chancellor and faculty/department boards.
LiU’s rule book for education at first-cycle and second-cycle levels is available at http://styrdokument.liu.se/Regelsamling/Innehall/Utbildning_pa_grund-_och_avancerad_niva.
Note: The course matrix might contain more information in Swedish.
I | U | A | Modules | Comment | ||
---|---|---|---|---|---|---|
1. DISCIPLINARY KNOWLEDGE AND REASONING | ||||||
1.1 Knowledge of underlying mathematics and science (G1X level) |
|
|
|
|||
1.2 Fundamental engineering knowledge (G1X level) |
X
|
X
|
X
|
|||
1.3 Further knowledge, methods, and tools in one or several subjects in engineering or natural science (G2X level) |
|
X
|
X
|
|||
1.4 Advanced knowledge, methods, and tools in one or several subjects in engineering or natural sciences (A1X level) |
|
|
|
|||
1.5 Insight into current research and development work |
|
|
|
|||
2. PERSONAL AND PROFESSIONAL SKILLS AND ATTRIBUTES | ||||||
2.1 Analytical reasoning and problem solving |
|
X
|
X
|
|||
2.2 Experimentation, investigation, and knowledge discovery |
|
X
|
X
|
|||
2.3 System thinking |
|
X
|
X
|
|||
2.4 Attitudes, thought, and learning |
X
|
X
|
X
|
|||
2.5 Ethics, equity, and other responsibilities |
|
|
X
|
|||
3. INTERPERSONAL SKILLS: TEAMWORK AND COMMUNICATION | ||||||
3.1 Teamwork |
|
|
X
|
|||
3.2 Communications |
|
X
|
X
|
|||
3.3 Communication in foreign languages |
|
|
X
|
|||
4. CONCEIVING, DESIGNING, IMPLEMENTING AND OPERATING SYSTEMS IN THE ENTERPRISE, SOCIETAL AND ENVIRONMENTAL CONTEXT | ||||||
4.1 External, societal, and environmental context |
|
|
|
|||
4.2 Enterprise and business context |
|
X
|
|
|||
4.3 Conceiving, system engineering and management |
|
X
|
|
|||
4.4 Designing |
|
X
|
X
|
|||
4.5 Implementing |
|
X
|
X
|
|||
4.6 Operating |
|
|
|
|||
5. PLANNING, EXECUTION AND PRESENTATION OF RESEARCH DEVELOPMENT PROJECTS WITH RESPECT TO SCIENTIFIC AND SOCIETAL NEEDS AND REQUIREMENTS | ||||||
5.1 Societal conditions, including economic, social, and ecological aspects of sustainable development for knowledge development |
|
|
|
|||
5.2 Economic conditions for knowledge development |
|
|
|
|||
5.3 Identification of needs, structuring and planning of research or development projects |
|
X
|
|
|||
5.4 Execution of research or development projects |
|
|
|
|||
5.5 Presentation and evaluation of research or development projects |
|
X
|
|
This tab contains public material from the course room in Lisam. The information published here is not legally binding, such material can be found under the other tabs on this page.
There are no files available for this course.