Introduction to the course Information Security Daniel Bosk - - PowerPoint PPT Presentation

introduction to the course information security
SMART_READER_LITE
LIVE PREVIEW

Introduction to the course Information Security Daniel Bosk - - PowerPoint PPT Presentation

Scope and aims Course structure and content overview Course content Assessment Introduction to the course Information Security Daniel Bosk Department of Information Systems and Technology Mid Sweden University, Sundsvall School of


slide-1
SLIDE 1

Scope and aims Course structure and content overview Course content Assessment

Introduction to the course Information Security

Daniel Bosk

Department of Information Systems and Technology Mid Sweden University, Sundsvall School of Electrical Engineering and Computer Science KTH Royal Institute of Technology, Stockholm

14th May 2018

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 1

slide-2
SLIDE 2

Scope and aims Course structure and content overview Course content Assessment

1 Scope and aims

Scope Aims

2 Course structure and content overview

Teaching and tutoring Schedule

3 Course content

P7 A short study in information security

4 Assessment

LADOK modules Handed-in assignments ‘What if I’m not done in time?’

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 2

slide-3
SLIDE 3

Scope and aims Course structure and content overview Course content Assessment Scope

The course treats a wide interpretation of Information Security. It treats both engineering and management. The first part is about management. The second part is about engineering. But the principles from the engineering parts can be applied in an organization’s process design too.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 3

slide-4
SLIDE 4

Scope and aims Course structure and content overview Course content Assessment Scope

The course treats a wide interpretation of Information Security. It treats both engineering and management. The first part is about management. The second part is about engineering. But the principles from the engineering parts can be applied in an organization’s process design too.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 3

slide-5
SLIDE 5

Scope and aims Course structure and content overview Course content Assessment Scope

The course treats a wide interpretation of Information Security. It treats both engineering and management. The first part is about management. The second part is about engineering. But the principles from the engineering parts can be applied in an organization’s process design too.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 3

slide-6
SLIDE 6

Scope and aims Course structure and content overview Course content Assessment Aims

You should be able to apply basic concepts and models in information security. evaluate the usability of security solutions and suggest improvements that improve usability and security. analyse threats, possible protection mechanisms and design an approach to protection which considers usability. apply the Swedish Civil Contingency Agency’s Framework for Information Security Management Systems to analyse, assess and improve the information security in an organization. review and apply the results of published research in the security field.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 4

slide-7
SLIDE 7

Scope and aims Course structure and content overview Course content Assessment Aims

You should be able to apply basic concepts and models in information security. evaluate the usability of security solutions and suggest improvements that improve usability and security. analyse threats, possible protection mechanisms and design an approach to protection which considers usability. apply the Swedish Civil Contingency Agency’s Framework for Information Security Management Systems to analyse, assess and improve the information security in an organization. review and apply the results of published research in the security field.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 4

slide-8
SLIDE 8

Scope and aims Course structure and content overview Course content Assessment Aims

You should be able to apply basic concepts and models in information security. evaluate the usability of security solutions and suggest improvements that improve usability and security. analyse threats, possible protection mechanisms and design an approach to protection which considers usability. apply the Swedish Civil Contingency Agency’s Framework for Information Security Management Systems to analyse, assess and improve the information security in an organization. review and apply the results of published research in the security field.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 4

slide-9
SLIDE 9

Scope and aims Course structure and content overview Course content Assessment Aims

You should be able to apply basic concepts and models in information security. evaluate the usability of security solutions and suggest improvements that improve usability and security. analyse threats, possible protection mechanisms and design an approach to protection which considers usability. apply the Swedish Civil Contingency Agency’s Framework for Information Security Management Systems to analyse, assess and improve the information security in an organization. review and apply the results of published research in the security field.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 4

slide-10
SLIDE 10

Scope and aims Course structure and content overview Course content Assessment

1 Scope and aims

Scope Aims

2 Course structure and content overview

Teaching and tutoring Schedule

3 Course content

P7 A short study in information security

4 Assessment

LADOK modules Handed-in assignments ‘What if I’m not done in time?’

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 5

slide-11
SLIDE 11

Scope and aims Course structure and content overview Course content Assessment Teaching and tutoring

Teaching consists of several types of learning sessions. Most topics are covered only by lectures. Some are complemented with seminars, hand-ins and labs. These are for combined learning and assessment. These are focused to the first six weeks. The last four weeks are dedicated to the project. These weeks have weekly tutoring sessions.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 6

slide-12
SLIDE 12

Scope and aims Course structure and content overview Course content Assessment Teaching and tutoring

Teaching consists of several types of learning sessions. Most topics are covered only by lectures. Some are complemented with seminars, hand-ins and labs. These are for combined learning and assessment. These are focused to the first six weeks. The last four weeks are dedicated to the project. These weeks have weekly tutoring sessions.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 6

slide-13
SLIDE 13

Scope and aims Course structure and content overview Course content Assessment Teaching and tutoring

Teaching consists of several types of learning sessions. Most topics are covered only by lectures. Some are complemented with seminars, hand-ins and labs. These are for combined learning and assessment. These are focused to the first six weeks. The last four weeks are dedicated to the project. These weeks have weekly tutoring sessions.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 6

slide-14
SLIDE 14

Scope and aims Course structure and content overview Course content Assessment Schedule

Week Work 1 Lecture: Course start/Foundations of security Lecture: Security usability 2 Lecture: MSB’s Framework, part I Start working on M1 (isms) Lecture: MSB’s Framework, part II Start working on M2, prepare S3 (risk) Lecture: Records management 3 Lecture: Information theory Lecture: Cryptography, part I Lecture: Cryptography, part II First grading of M1 (isms), M2 (risk)

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 7

slide-15
SLIDE 15

Scope and aims Course structure and content overview Course content Assessment Schedule

4 Lecture: Identification and authentication, part I Lecture: Identification and authentication, part II Lecture: Protocols and formal verification First seminar session S3 (risk) 5 Lecture: Access control Lecture: Accountability Lab: L4 (pwdguess), L6 (pricomlab) Seminar: S5 (pwdpolicies) 6 Lecture: Trusted computing Lecture: Software security Lecture: Course conclusion Lab: L4 (pwdguess), L6 (pricomlab)

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 8

slide-16
SLIDE 16

Scope and aims Course structure and content overview Course content Assessment Schedule

7 Tutoring: P7 (research) Lab: L4 (pwdguess), L6 (pricomlab) 8 Tutoring: P7 (research) Lab: L4 (pwdguess), L6 (pricomlab) 9 Tutoring: P7 (research) 10 Presentation: P7 (research) Second grading of M1 (isms), M2 (risk) Seminar: second call for seminars (S3, S5) Lab: final call for labs

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 9

slide-17
SLIDE 17

Scope and aims Course structure and content overview Course content Assessment Schedule

+3 months Presentation: second call for presentations (P7) Final grading of M1 (isms), M2 (risk) Seminar: final call for seminars (S3, S5) +6 months Presentation: final call for presentations (P7)

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 10

slide-18
SLIDE 18

Scope and aims Course structure and content overview Course content Assessment

1 Scope and aims

Scope Aims

2 Course structure and content overview

Teaching and tutoring Schedule

3 Course content

P7 A short study in information security

4 Assessment

LADOK modules Handed-in assignments ‘What if I’m not done in time?’

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 11

slide-19
SLIDE 19

Scope and aims Course structure and content overview Course content Assessment P7 A short study in information security

Small independent study in information security. Aim is to practice your knowledge from the course. As well as deepen your knowledge in some parts. And to assess that you reach the intended learning outcomes (ILOs) above.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 12

slide-20
SLIDE 20

Scope and aims Course structure and content overview Course content Assessment P7 A short study in information security

Small independent study in information security. Aim is to practice your knowledge from the course. As well as deepen your knowledge in some parts. And to assess that you reach the ILOs above.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 12

slide-21
SLIDE 21

Scope and aims Course structure and content overview Course content Assessment P7 A short study in information security

You are quite free in choosing. But the project must be connected to research. You must select and read relevant research papers.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 13

slide-22
SLIDE 22

Scope and aims Course structure and content overview Course content Assessment

1 Scope and aims

Scope Aims

2 Course structure and content overview

Teaching and tutoring Schedule

3 Course content

P7 A short study in information security

4 Assessment

LADOK modules Handed-in assignments ‘What if I’m not done in time?’

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 14

slide-23
SLIDE 23

Scope and aims Course structure and content overview Course content Assessment LADOK modules

LADOK Credits (ECTS) Grade Course Assignments I104 1.5 P, F M1, M2, S3, S5 L104 1.5 P, F L4, L6 R104 4.5 A–F P7 Total 7.5 A–F P7

Table: Table summarizing course modules and their mapping to LADOK. P means pass, F means fail. A–E are also passing grades, where A is the best.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 15

slide-24
SLIDE 24

Scope and aims Course structure and content overview Course content Assessment Handed-in assignments

Must be in ‘passable’ condition. Otherwise rejection without comment. No plagiarism accepted. When working in group: everyone accountable.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 16

slide-25
SLIDE 25

Scope and aims Course structure and content overview Course content Assessment Handed-in assignments

Must be in ‘passable’ condition. Otherwise rejection without comment. No plagiarism accepted. When working in group: everyone accountable.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 16

slide-26
SLIDE 26

Scope and aims Course structure and content overview Course content Assessment ‘What if I’m not done in time?’

You have three chances for grading per year. These are marked in the schedule. Thus there will be three deadlines per assignment until the next time the course is given.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 17

slide-27
SLIDE 27

Scope and aims Course structure and content overview Course content Assessment ‘What if I’m not done in time?’

No tutoring is planned after the course. If you want to ensure tutoring, it’s during the course.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 18

slide-28
SLIDE 28

Scope and aims Course structure and content overview Course content Assessment ‘What if I’m not done in time?’

If you predict you will not finish on time Within three weeks of course start, deregister from the course. This allows you to reregister next time the course is given. You must reregister to get access to the course the following year. If you haven’t cancelled, you’ll be last in the queue.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 19

slide-29
SLIDE 29

Scope and aims Course structure and content overview Course content Assessment ‘What if I’m not done in time?’

If you predict you will not finish on time Within three weeks of course start, deregister from the course. This allows you to reregister next time the course is given. You must reregister to get access to the course the following year. If you haven’t cancelled, you’ll be last in the queue.

Daniel Bosk MIUN IST, KTH EECS Introduction to the course Information Security 19