Skip to main content

Information Security (5 cr)

Code: 3011366-3001

General information


Enrollment
04.08.2018 - 02.09.2018
Registration for the implementation has ended.
Timing
03.09.2018 - 14.12.2018
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
5 cr
Mode of delivery
Contact learning
Unit
Engineering and Business
Teaching languages
English
Seats
10 - 50
Degree programmes
Degree Programme in Business Information Technology
Teachers
Jani Ekqvist
Teacher in charge
Jani Ekqvist
Course
3011366
No reservations found for realization 3011366-3001!

Evaluation scale

H-5

Content scheduling

The importance of Information Security for different organizations (i.e. business, non-profit, societies)
Basic principles of Information Security
Players in the Information Security field (good guys, bad guys)
Information Security Standards and Best Practices
The basics of Information Security Risk Assessment and Risk Management
The subareas of Information Security (i.a. traditional, standard based, best practices)
Threats and attack methods facing different organizations, and protection against them
Basic principles of encryption and firewalls
Business Continuity and Disaster Recovery Planning
Laboratory work

Objective

After passing the course the student can
- name and explain the basic principles of Information Security
- classify information and information systems
- identify information security threats
- give examples of information security controls and their implementations
- identify and list information security requirements in different kind of organizations taking into account juridical and regulatory requirements
- assess whether there are shortages in security controls’ implementations and give justified recommendations for their improvements
- explain the basics of information security risk management
- create, assess and improve business continuity and disaster recovery plans
- apply information security penetration testing toolkits.

Content

- The importance of Information Security for different organizations (i.e. business, non-profit, societies)
- Basic principles of Information Security
- Players in the Information Security field (good guys, bad guys)
- Information Security Standards and Best Practices
- The basics of Information Security Risk Assessment and Risk Management
- The subareas of Information Security (i.a. traditional, standard based, best practices)
- Threats and attack methods facing different organizations, and protection against them     
- Basic principles of encryption and firewalls
- Business Continuity and Disaster Recovery Planning
- Laboratory work

Materials

Will be provided in Optima during the course.

Exam schedules

There will be no exam on the course.

Completion alternatives

You may substitute lab work by joining the team arranging the Information Security Day event in March.

Student workload

Lectures 20h
Weekly homework 88h
Lab work in December 27h

Evaluation methods and criteria

Weekly homework will be graded.

Failed (0)

Less than 50% homework correct or lab work not completed.

Assessment criteria, satisfactory (1-2)

50-70% homework grade

Assessment criteria, good (3-4)

70-90% homework grade

Assessment criteria, excellent (5)

Homework grade > 90%

Go back to top of page