Module/Course Title: Cyber Security

Module course code

KOMS120610

Student Workload
119 hours

Credits

3 / 4.5 ETCS

Semester

6

Frequency

Even Semester

Duration

16

1

Type of course

Field of Study Courses

Contact hours


40 hours of face-to-face (theoretical) class activity

Independent Study


48 hours of independent activity
48 hours of structured activities

Class Size

30

2

Prerequisites for participation (if applicable)

-

3

Learning Outcomes

  1. Students can demonstrate systematic thinking in selecting information technology architecture
  2. Students can analyze information technology infrastructure requirements
  3. Students can design information technology infrastructure solutions
  4. Students can explain the fundamental concepts of cybersecurity
  5. Students can describe cybersecurity principles
  6. Students can construct awareness of ethical and legal issues related to cybersecurity
  7. Students can recommend cybersecurity solutions to a real-world problems

4

Subject aims/Content

This course provides an introduction to the field of cybersecurity, covering fundamental concepts, techniques, and best practices. It focuses on securing digital assets and systems from cyber threats. It primarily deals with the protection of computer networks, systems, and data from unauthorized access, attacks, and breaches. It also includes related topics such as network security, application security, data protection, incident response, and the identification and mitigation of cyber threats. Practical hands-on exercises and case studies are incorporated to enhance skills in securing systems, identifying vulnerabilities, and implementing effective cybersecurity measures. Students will gain knowledge and skills related to securing information systems, protecting against cyber threats, and managing security incidents.

Study Material

Computer and network security

Information acquisition (Reconnaissance)

The Human Factor in Network Security

Malicious Software

Malicious Software (2)

Web threat

Operating System Threat

MIDTERM EXAM

Network Security

Network Security

Risk Management

Cloud Technology

Intrusion Detection and Prevention

Privacy & Personal Data

Emerging Technology

FINAL EXAMS"

5

Teaching methods

Synchronous: face-to-face (online)

Asynchronous: Delivery of material through modules in e-learning in the form of text, audio, or video. Internet research

6

Assesment Methods

Assignment

7

This module/course is used in the following study programme/s as well

Computer Science Study Programme

8

Responsibility for module/course

  • Kadek Yota Ernanda Aryanto, M.T. Ph.D.
  • NIDN : 0024037804

9

Other Information

Books:

  1. Pfleeger, C.P., 2015, Security in Computing 5th Edition, Prentice Hall
  2. Kolokotronis, N, Shiaeles, S., 2021, Cyber-Security Threats, Actors, and Dynamic Mitigation, CRC Press

Publications:

  1. Moller, D.P.F, 2020, Cybersecurity in Digital Transformation: Scope and Applications, Springer
  2. M. Jain, A. Sinha, A. Agrawal and N. Yadav, "Cyber security: Current threats, challenges, and prevention methods," 2022 International Conference on Advances in Computing, Communication and Materials (ICACCM), Dehradun, India, 2022, pp. 1-9, doi: 10.1109/ICACCM56405.2022.10009154.
  3. R. Chivukula, T. Jaya Lakshmi, L. Ranganadha Reddy Kandula and K. Alla, "A Study of Cyber Security Issues and Challenges," 2021 IEEE Bombay Section Signature Conference (IBSSC), Gwalior, India, 2021, pp. 1-5, doi: 10.1109/IBSSC53889.2021.9673270.
  4. H. Arora, T. Manglani, G. Bakshi and S. Choudhary, "Cyber Security Challenges and Trends on Recent Technologies," 2022 6th International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 2022, pp. 115-118, doi: 10.1109/ICCMC53470.2022.9753967.