Basics of Information Security (3 cr)
Code: XX00AA89-3025
General information
Enrollment
23.08.2017
Timing
01.01.2020 - 31.12.2020
Number of ECTS credits allocated
3 op
Virtual portion
3 op
Mode of delivery
Distance learning
Unit
School of ICT
Campus
Karaportti 2
Teaching languages
- Finnish
Seats
0 - 99
Degree programmes
- Information and Communication Technology
Teachers
- Virve Prami
Teacher in charge
Virve Prami
Groups
-
ATX20TVOpen UAS - NonStop year 2020
Objective
After the course, the student has basic knowledge of information security and what is the meaning of information security for the companies. He or she knows the basic concepts and how basic security mechanisms work. He or she knows different cryptographic methods from the past to now.
Content
- basic concepts of information security
- company's Information Security Policy & Information Security Plan
- different vulnerabilities, how to find them and how to protect
- application security
- safe use of computers
- server security (backups, fault tolerance)
- authentication
- network security
- basics of cryptography, historical view, modern crpyptographic methods, symmetric & asymmetric methods, passwords, digital signatures
Materials
N/A
Teaching methods
Online (Self-Study) course in Moodle environment
Employer connections
N/A
International connections
N/A
Completion alternatives
N/A
Further information
ENROLLING
Open UAS Student: Please fill in eform
Metropolia's Degree Student
- Go to https://moodle.metropolia.fi/course/view.php?id=159
- Enrolment key: saksanhirvi
- Follow instructions
If you have problems with this course, please contact to Janne Salonen.
Evaluation scale
Hyväksytty/Hylätty
Assessment criteria, satisfactory (1)
The student knows the basic concepts of information security and what it means to companies. He/she also knows elementary threats to the information systems. He or she knows different vulnerabilities for companys database. He or she understand different user levels and why they are needed.
Assessment criteria, good (3)
The student understands application security as well as users point of view as programmes. He or she knows different backup methods and RAID-levels. He or she recognizes vulnerabilites from network, He or she knows different cryptographic methods and could estimate how strong the are.
Assessment criteria, excellent (5)
The student knows solutions for applications security. He or she knows ho different cryptographic methods are working and how to make digital signatures. He or she can estimate how different vulnerabilities affects companys database and he or she can tell solutions how to protect them.
Prerequisites
Introduction to Computing,
Setting Up and Usage of Personal Computer (PC)