Siirry suoraan sisältöön

Tietoturvallisuuden perusteet (3 cr)

Code: XX00AA89-3025

General information


Enrollment

23.08.2017

Timing

01.01.2020 - 31.12.2020

Number of ECTS credits allocated

3 op

Virtual portion

3 op

Mode of delivery

Distance learning

Unit

ICT ja tuotantotalous

Campus

Karaportti 2

Teaching languages

  • Finnish

Seats

0 - 99

Degree programmes

  • Tieto- ja viestintätekniikan tutkinto-ohjelma

Teachers

  • Virve Prami

Teacher in charge

Virve Prami

Groups

  • ATX20TV
    Avoin amk - NonStop vuosi 2020

Objective

After the course, the student has basic knowledge of information security and what is the meaning of information security for the companies. He or she knows the basic concepts and how basic security mechanisms work. He or she knows different cryptographic methods from the past to now.

Content

- basic concepts of information security
- company's Information Security Policy & Information Security Plan
- different vulnerabilities, how to find them and how to protect
- application security
- safe use of computers
- server security (backups, fault tolerance)
- authentication
- network security
- basics of cryptography, historical view, modern crpyptographic methods, symmetric & asymmetric methods, passwords, digital signatures

Materials

N/A

Teaching methods

Online (Self-Study) course in Moodle environment

Employer connections

N/A

International connections

N/A

Completion alternatives

N/A

Further information

ENROLLING
Open UAS Student: Please fill in eform
Metropolia's Degree Student
- Go to https://moodle.metropolia.fi/course/view.php?id=159
- Enrolment key: saksanhirvi
- Follow instructions
If you have problems with this course, please contact to Janne Salonen.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, satisfactory (1)

The student knows the basic concepts of information security and what it means to companies. He/she also knows elementary threats to the information systems. He or she knows different vulnerabilities for companys database. He or she understand different user levels and why they are needed.

Assessment criteria, good (3)

The student understands application security as well as users point of view as programmes. He or she knows different backup methods and RAID-levels. He or she recognizes vulnerabilites from network, He or she knows different cryptographic methods and could estimate how strong the are.

Assessment criteria, excellent (5)

The student knows solutions for applications security. He or she knows ho different cryptographic methods are working and how to make digital signatures. He or she can estimate how different vulnerabilities affects companys database and he or she can tell solutions how to protect them.

Qualifications

Introduction to Computing,
Setting Up and Usage of Personal Computer (PC)