Module/Course Title: Information Security

Module course code

KOMS120506

Student Workload
119 hours

Credits

3 / 4.5 ETCS

Semester

5

Frequency

Odd Semester

Duration

16

1

Type of course

Field of Study Courses

Contact hours


40 hours of face-to-face (theoretical) class activity

Independent Study


48 hours of independent activity
48 hours of structured activities

Class Size

30

2

Prerequisites for participation (if applicable)

-

3

Learning Outcomes

  1. Students can demonstrate systematic thinking in selecting information technology architecture
  2. Students can analyze information technology infrastructure requirements
  3. Students can design information technology infrastructure solutions
  4. Students are able describe the concept of information security and its implementation
  5. Students can analyse risks and apply appropriate response to incidents of security breach
  6. Students can design information security solutions for data transmitted in the network

4

Subject aims/Content

This course provides an understanding of protecting information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. Students will learn about the principles, concepts, and best practices in securing computer systems, networks, and data. The course covers topics such as risk assessment, threat modeling, access control, cryptography, network security, and incident response. Students gain practical skills in implementing security measures, conducting vulnerability assessments, and designing secure systems. Additionally, the course explores legal and ethical aspects of information security and emphasizes the importance of ongoing monitoring, updates, and adaptation to address evolving threats.

Study Material

Data security threats

Security principles: the human aspect

Information ​security management

Security on the server

Security on client devices

risk management

Risk Management in Organizations

MIDTERM EXAM

Security Incident Response

Cryptography

Cryptography (2)

Data Integrity

Public Key Infrastructure

Cybersecurity Law

Cyber Forensic

FINAL EXAMS

5

Teaching methods

Synchronous: face to face (online)

Asynchronous: Delivery of material through modules via e-learning in the form of text, audio, or video

6

Assesment Methods

Assignment

7

This module/course is used in the following study programme/s as well

Computer Science Study Programme

8

Responsibility for module/course

  • Kadek Yota Ernanda Aryanto, M.T. Ph.D.
  • NIDN : 0024037804

9

Other Information

Books:

  1. Whitman, Michael, Mattord, Herbert, 2016, Principles of Information Security (6th Edition), Cengage Learning,
  2. Chris Moschovitis, 2021, Privacy, Regulations, and Cybersecurity: The Essential Business Guide, Wiley Publisher

Publications:

  1. F. Alkhudhayr, S. Alfarraj, B. Aljameeli and S. Elkhdiri, "Information Security:A Review of Information Security Issues and Techniques," 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 2019, pp. 1-6, doi: 10.1109/CAIS.2019.8769504.
  2. P. A. Wortman and J. A. Chandy, “A framework for evaluating security risk in system design,” Discov. Internet Things, vol. 2, no. 1, 2022, doi: 10.1007/s43926-022-00027-w.
  3. H. -Y. Tran, J. Hu, X. Yin and H. R. Pota, "An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2538-2552, 2023, doi: 10.1109/TIFS.2023.3267892.
  4. C. Xu, Y. Makihara, X. Li and Y. Yagi, "Occlusion-Aware Human Mesh Model-Based Gait Recognition," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1309-1321, 2023, doi: 10.1109/TIFS.2023.3236181.