|
Module/Course Title: Information Security |
|||||
|
Module course code KOMS120506 |
Student Workload
|
Credits 3 / 4.5 ETCS |
Semester 5 |
Frequency
Odd Semester |
Duration 16 |
|
1 |
Type
of course Field of Study Courses |
Contact
hours
|
Independent
Study
|
Class Size 30 |
|
|
2 |
Prerequisites
for participation (if applicable) - |
||||
|
3 |
Learning Outcomes
|
||||
|
4 |
Subject aims/Content This course provides an understanding of protecting information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. Students will learn about the principles, concepts, and best practices in securing computer systems, networks, and data. The course covers topics such as risk assessment, threat modeling, access control, cryptography, network security, and incident response. Students gain practical skills in implementing security measures, conducting vulnerability assessments, and designing secure systems. Additionally, the course explores legal and ethical aspects of information security and emphasizes the importance of ongoing monitoring, updates, and adaptation to address evolving threats. Study MaterialData security threats Security principles: the human aspect Information ​security management Security on the server Security on client devices risk management Risk Management in Organizations MIDTERM EXAM Security Incident Response Cryptography Cryptography (2) Data Integrity Public Key Infrastructure Cybersecurity Law Cyber Forensic FINAL EXAMS |
||||
|
5 |
Teaching methods
Synchronous: face to face (online) Asynchronous: Delivery of material through modules via e-learning in the form of text, audio, or video |
||||
|
6 |
Assesment Methods
Assignment |
||||
|
7 |
This module/course is used in the following study programme/s as well Computer Science Study Programme |
||||
|
8 |
Responsibility for module/course
|
||||
|
9 |
Other Information Books:
Publications:
|
||||