PDF for print Find calendar

Elective Course: IT security

Title
Elective Course: IT security
Semester
E2023
Master programme in
Computer Science / Digital Transformation
Type of activity

Course

Teaching language
English
Study regulation

Read about the Master Programme and find the Study Regulations at ruc.dk

REGISTRATION AND STUDY ADMINISTRATIVE
Registration

You register for activities through stads selvbetjening during the announced registration period, which you can see on the Study administration homepage.

When registering for courses, please be aware of the potential conflicts and overlaps between course and exam time and dates. The planning of course activities at Roskilde University is based on the recommended study programmes, which should not overlap. However, if you choose optional courses and/or study plans that goes beyond the recommended study programmes, an overlap of lectures or exam dates may occur depending on which courses you choose.

Number of participants
ECTS
5
Responsible for the activity
Niels Jørgensen (nielsj@ruc.dk)
Head of study
Henrik Bulskov (bulskov@ruc.dk)
Teachers
  • Mika Yasuoka Jensen

  • Pavlos Chatzipolakis

  • Niels Jørgensen

Study administration
IMT Registration & Exams (imt-exams@ruc.dk)
Exam code(s)
U60594
ACADEMIC CONTENT
Overall objective

The purpose of elective courses is to give the student opportunitities to specialize within a specific subject area, where the student acquires knowledge, skills and competences in order to translate theories, methods and solutions ideas into their own practice.

Detailed description of content

The course is case-based. Each lecture discusses a security attack or breach. Cases include the NotPetya attack, attacks on private health care data in Denmark, surveillance of citizens, attacks on VR systems, and many others.

Cases are selected to support the students' understanding of:

  • security and privacy goals, including confidentiality, integrity and privacy

  • types of security and privacy attacks, including denial of service attacks, viruses, worms and social engineering

  • technical means to attain the goals, including encryption and digital signatures

  • organizational means to attain the goals, including implementation in a company of standards and regulations (for example ISO 27000 and GDPR)

  • how can society at large protect itself, how can citizens protect themselves, and how can a security policy relate to and involve citizens?

Course material and Reading list

The main literature will be research and other articles. In addion we will probably use a textbook. We will make the title available on the moodle page of the course.

Overall plan and expected work effort

The course will have a total workload of 135 hours with 40 hours of lectures and exercises, 70 hours of preparation over a 10-11 week course period, and finally 25 hours for the exam and preparation before the course.

Format
Evaluation and feedback

Evaluation form to be filled out (anonymously) plus open discussion on the last course day.

There will be feedback on exercises that students are asked to do during the course.

Programme
ASSESSMENT
Overall learning outcomes

After completing this course, students will be able to:

  • demonstrate knowledge within a defined subject area.

  • demonstrate an overall overview and understanding of the general principles behind the field’s theory, methods and technological solutions.

  • choose and apply appropriate methods and techniques relevant to the field to analyse, design and implement solutions

  • work with it-related problems within their field, both individually and in groups.

  • be proficient in new approaches within the subject area in a critical and systematic way and thereby independently take responsibility for their own professional development.

Form of examination
Individual oral exam based on a written product

The character limit of the written product is maximum48,000 characters, including spaces.
The character limits include the cover, table of contents, bibliography, figures and other illustrations, but exclude any appendices.

Time allowed for exam including time used for assessment: 20 minutes.
The assessment is an overall assessment of the written product(s) and the subsequent oral examination.

Permitted support and preparation materials for the oral exam: All.

Assessment: 7-point grading scale.
Moderation: Internal co-assessor.
Form of Re-examination
Samme som ordinær eksamen / same form as ordinary exam
Type of examination in special cases
Examination and assessment criteria
Exam code(s)
Exam code(s) : U60594
Last changed 25/05/2023

lecture list:

Show lessons for Subclass: 1 Find calendar (1) PDF for print (1)

Thursday 14-09-2023 08:15 - 14-09-2023 12:00 in week 37
IT-security (COMP)

Thursday 21-09-2023 08:15 - 21-09-2023 12:00 in week 38
IT-security (COMP)

Thursday 28-09-2023 08:15 - 28-09-2023 12:00 in week 39
IT-security (COMP)

Thursday 05-10-2023 08:15 - 05-10-2023 12:00 in week 40
IT-security (COMP)

Thursday 12-10-2023 08:15 - 12-10-2023 12:00 in week 41
IT-security (COMP)

Thursday 19-10-2023 08:15 - 19-10-2023 12:00 in week 42
IT-security (COMP)

Thursday 26-10-2023 08:15 - 26-10-2023 12:00 in week 43
IT-security (COMP)

Thursday 02-11-2023 08:15 - 02-11-2023 12:00 in week 44
IT-security (COMP)

Thursday 09-11-2023 08:15 - 09-11-2023 12:00 in week 45
IT-security (COMP)

Thursday 16-11-2023 08:15 - 16-11-2023 12:00 in week 46
IT-security (COMP)

Friday 24-11-2023 16:00 - 24-11-2023 16:00 in week 47
IT-security - Hand-in (COMP)

Monday 22-01-2024 08:15 - Tuesday 23-01-2024 18:00 in week 04
IT-security - Oral examination (COMP)

Thursday 15-02-2024 10:00 - 15-02-2024 10:00 in week 07
IT-security - Reexam hand-in (COMP)

Thursday 22-02-2024 08:15 - 22-02-2024 18:00 in week 08
IT-security - Oral reexamination (COMP)