Skip to main content

IT Security (5 cr)

Code: TX00CO18-3010

General information


Enrollment
19.12.2022 - 08.01.2023
Registration for the implementation has ended.
Timing
16.01.2023 - 12.03.2023
Implementation has ended.
Number of ECTS credits allocated
5 cr
Virtual portion
5 cr
Mode of delivery
Online
Unit
(2019-2024) School of ICT
Campus
Karaportti 2
Teaching languages
English
Seats
0 - 55
Degree programmes
Degree Programme in Information Technology
Information and Communication Technology
Teachers
Erik Pätynen
Groups
TXK22S2
Tieto- ja viestintätekniikan tutkinto-ohjelma, verkkototeutus
Course
TX00CO18
No reservations found for implementation TX00CO18-3010!

Objective

The student is familiar with general aspects of information security:
Risk assessment and security management, Security mechanisms, User authentication and access control, Security algorithms, protocols and standards

Content

Definition of information security and information security process. Security requirements, risk analysis and information protection mechanisms. Risk assesment. Introduction to cryptography; symmetric and asymmetric encryption. Certificates and digital signatures. Building up secure information systems.

Location and time

https://moodle.metropolia.fi

Materials

Online material

Teaching methods

Online curse

Evaluation scale

0-5

Assessment criteria, satisfactory (1)

The student knows the basic concepts of information security. He/she also knows elementary threats to information systems. He/she knows why encryption and digital signature are needed.

Assessment criteria, good (3)

The student knows how threats can be reduced using different security mechanisms.

Assessment criteria, excellent (5)

The student knows the principles of risk analysis. He/she knows also how encryption mechanisms work and how digital signature is implemented. He/she understands how simple authentication protocols work.

Assessment criteria, approved/failed

The student knows the basic concepts of information security. He/she also knows elementary threats to information systems. He/she knows why encryption and digital signature are needed.

Assessment methods and criteria

Online exercises
Theory exam

Go back to top of page