Prospectus

nl en

Case Studies in Cyber Security

Course
2019-2020

Admission requirements

Admission only after intake, see website of the Cyber Security Academy.
Admission only for those students who are enrolled in the technical track.

Description

In this course attention is paid to scientific research design and technical report writing. In addition to this, this course deals with security management, security design principles, security in architecture and resilience engineering, sensitive data processing and the usage of anonymisation techniques.

Whereas in modules Measures and Interventions and Network Security of the technical track attention was paid to the characteristics of ICT systems, types of attacks and possible security measures, the main aim of this course is that students translate and apply their theoretical/technical knowledge in specific case studies. Case studies will be related to mobile system security, SOC operations and security monitoring, threat modelling, data integrity in the cloud, and blockchain technology. Participants will design a security architecture and analyze a system for the chosen case. They should write a primarily technical report, taking non-technical aspects and possible impact into account. In addition to the report the students should give a presentation for both staff and their colleagues.

Course objectives

Participants have:

  • understanding of cyber threats and vulnerabilities, incidents and their potential impact

Participants are able to:

  • identify in a practical case possible attacks, translate them to technical requirements, and the latter to security measures, taking the non-technical aspects into account

  • translate and apply theoretical knowledge of cyber security to professional practice

  • weigh business and security risks and to define technical requirements

  • translate technical understanding into a multidisciplinary oriented policy

Timetable

7 days from 9.30 until 17.00 in February and March 2020

Mode of instruction

Lectures, seminars, exercises, class discussion
Lecturers: Olga Gadyatskaya, Zeki Erkin, Renato Kuiper

Course Load

5 EC

Assessment method

  • 20% presentation

  • 45% report on mobile security

  • 35% report on SOC use cases

Only assessments with the weight of 30% and lower are compensable. This means that one does not have to pass an assessment if it weighs 30% or less in order to pass the course, if the average of all assessments combined is at least a 5.5. In addition, assignments weighing up to and including 30% are not re-sitable, meaning that if one failed an assessment of 30% or less one is not allowed to redo it and that assessment must be compensated by the other assessment(s).

The resit will take the same form.

Blackboard

Yes, for posting slides of lectures, relevant literature and assignments.

Reading list

Compulsory literature and literature for further consultation will be announced via Blackboard.

Registration

No registration is required for lectures and exams.

Contact

TBD Chantal de Groot, study coordinator

Remarks

For more information see the website of the Cyber Security Academy.