IT Security (5ECTS)
Code: TX00CO18-3010
General information
- Enrollment
- 19.12.2022 - 08.01.2023
- Registration for the implementation has ended.
- Timing
- 16.01.2023 - 12.03.2023
- Implementation has ended.
- Number of ECTS credits allocated
- 5 ECTS
- Virtual portion
- 5 ECTS
- Mode of delivery
- Online
- Campus
- Karaportti 2
- Teaching languages
- English
- Seats
- 0 - 55
- Degree programmes
- Degree Programme in Information Technology
- Information and Communication Technology
- Teachers
- Erik Pätynen
- Groups
-
TXK22S2Tieto- ja viestintätekniikan tutkinto-ohjelma, verkkototeutus
- Course
- TX00CO18
No reservations found for implementation TX00CO18-3010!
Learning outcomes
The student is familiar with general aspects of information security:
Risk assessment and security management, Security mechanisms, User authentication and access control, Security algorithms, protocols and standards
Content
Definition of information security and information security process. Security requirements, risk analysis and information protection mechanisms. Risk assesment. Introduction to cryptography; symmetric and asymmetric encryption. Certificates and digital signatures. Building up secure information systems.
Teaching methods
Online curse
Location and time
Learning materials and recommended literature
Online material
Assessment methods and criteria
Online exercises
Theory exam
Evaluation scale
0-5
Assessment criteria, satisfactory (1)
The student knows the basic concepts of information security. He/she also knows elementary threats to information systems. He/she knows why encryption and digital signature are needed.
Assessment criteria, good (3)
The student knows how threats can be reduced using different security mechanisms.
Assessment criteria, excellent (5)
The student knows the principles of risk analysis. He/she knows also how encryption mechanisms work and how digital signature is implemented. He/she understands how simple authentication protocols work.
Assessment criteria, approved/failed
The student knows the basic concepts of information security. He/she also knows elementary threats to information systems. He/she knows why encryption and digital signature are needed.