This course syllabus is discontinued or replaced by a new course syllabus. |
|
Course Syllabus |
Informatics, Introduction to Information Security, Second Cycle, 7.5 Credits |
Course Code: | IK401A | Subject Area: | Field of Technology |
---|---|---|---|
Main Field of Study: | Informatics | Credits: | 7.5 |
Subject Group (SCB): | Informatics/Computer and Systems Sciences | ||
Education Cycle: | Second Cycle | Progression: | A1N |
Established: | 2017-11-17 | Last Approved: | 2018-03-27 |
Valid from: | Autumn semester 2018 | Approved by: | Head of School |
General aims for second cycle education
Second-cycle courses and study programmes shall involve the acquisition of specialist knowledge, competence and skills in relation to first-cycle courses and study programmes, and in addition to the requirements for first-cycle courses and study programmes shall
- further develop the ability of students to integrate and make autonomous use of their knowledge
- develop the students' ability to deal with complex phenomena, issues and situations, and
- develop the students' potential for professional activities that demand considerable autonomy, or for research and development work.
(Higher Education Act, Chapter 1, Section 9)
1. Through surrounding world analysis understand the importance of information security in an increasingly digitilized world.
2. Based on practical guidelines be able to define and use key concepts within information security.
3. Based on relevant research understand how key concepts can be defined and used differently.
4. Based on relevant research understand different perspectives on information security.
5. Be able to describe national and international structures and processes for information security based on a case analysis.
6. Have an ability to critically evaluate other students' written work based on given criteria.
The course will be organized around five modules:
1. Introduction to the information security master program. During this module we present the structure of the program, the background and the pedagogical methods used. We also discuss professional roles that are focused during the program.
2. Motives for working with information security. During this module we introduce the field of information security - history, why it is important and standardization bodies. All issues will be discussed from an international-, national-, organizational- and individual level. The students also attend seminars where they analyze and discuss real security incidents, the importance of the field, existing threats and so on. (Addressing goal 1)
3. The most important concepts, models and perspectives. During this module the students read provided course literature, and watch recorded lectures. The students also attend seminars where they discuss important concepts, models and perspectives. The key concepts introduced during the course are for example: confidentiality, integrity, availability, threat, risk, incident, information assets, and security measures. (Addressing goals 2, 3 and 4)
4. Structures and processes for information security (international and national organizations, management systems, standards). During this module the students search for information about one information security organization and present it to the other groups. During the seminar the students will build a framework showing relationships between all the organizations previously presented (Addressing goal 5).
5. Criteria for critical evaluation of written report. During this module the students read the provided course literature and use recorded lectures. The students also attend seminars where they discuss criteria for critical evaluation of a written report. The students then use these critera in order to evaluate a written report. (Addressing goal 6)
The employeed teaching methods are anchored in flipped classroom and case-based learning. The flipped classroom means focusing on exploring topics in greater depth and creating meaningful learning opportunities in class time, while content delivery is made outside of the classroom. Case-based learning means that scenarios from real-world examples are used to as a point of departure for in class activities and assignments. In this course these theaching methods are implemented through online lectures, individual readings, seminars based on cases, and group assignments based on cases.
Students who have been admitted to and registered on a course have the right to receive tuition and/or supervision for the duration of the time period specified for the particular course to which they were accepted (see, the university's admission regulations (in Swedish)). After that, the right to receive tuition and/or supervision expires.
For further information, see the university's local examination regulations (in Swedish).
According to the Higher Education Ordinance, Chapter 6, Section 18, a grade is to be awarded on the completion of a course, unless otherwise prescribed by the university. The university may prescribe which grading system shall apply. The grade is to be determined by a teacher specifically appointed by the university (an examiner).
According to regulations on grading systems for first- and second-cycle education (vice-chancellor's decision 2010-10-19, reg. no. CF 12-540/2010), one of the following grades is to be used: fail, pass, or pass with distinction. The vice-chancellor or a person appointed by the vice-chancellor may decide on exceptions from this provision for a specific course, if there are special reasons.
Grades used on course are Fail (U), Pass (G) or Pass with Distinction (VG).
FINAL GRADE
The final grade will be translated into the ECTS grading scale.
In order to receive the grade Pass, the student must be awarded a minimum Pass on all examinations. In order to receive the grade Pass with Distiniction, the student has to be awarded the grade Pass with Distinction on the Individual Written Assignment and Pass on all other examination parts.
For further information, see the university's local examination regulations (in Swedish).
Informatics, Basic Course 30 Credits, 30 Credits at intermediate course level within Informatics and successful completion of at least 15 Credits at advanced course level within Informatics. Alternatively Business Administration, Basic Course, 30 Credits, Business Administration, Intermediate Course, 30 Credits and successful completion of at least 15 Credits at advanced course level within Business Administration. Alternatively 30 Credits within G1N in Computer Science and 45 Credits within G1F in Computer Science. The applicant must also have qualifications corresponding to the course "English 6" or "English B" from the Swedish Upper Secondary School.
For further information, see the university's admission regulations (in Swedish).
Students who have previously completed higher education or other activities are, in accordance with the Higher Education Ordinance, entitled to have these credited towards the current programme, providing that the previous studies or activities meet certain criteria.
For further information, see the university's local credit transfer regulations (in Swedish).
Remaining tasks should be completed as soon as possible according to the teacher's instructions.
Reading List and Other Teaching Materials
Required Reading
Standarder som används under kursen kommer vara tillgängliga till studenterna genom universitetsbibliotekets hemsida. Lärare kommer under kursen föreslå forskningsartiklar för de olika kursmodulerna. Uppskattningsvis 200 sidor./ The standards that are used during the course will be made available via the University library's homepage. Additional research papers and course material will be made available by the department, approximately 200 pages.