Vanwege de coronamaatregelen kan de onderwijsvorm of tentaminering afwijken. Zie voor actuele informatie de betreffende cursuspagina’s op Brightspace.

Studiegids

nl en

Introduction to cyberspace

Vak
2018-2019

Admission requirements

Admission only after intake, see website of the Cyber Security Academy.

Description

Aiming to avoid overlap with other courses (elective as well as mandatory courses) that are taught later in the curriculum, the content of this course is limited to the introductory stage and includes:

  • exploring what cyberspace entails: first explorations in conceptualising cyberspace, its working, cyber risks, and cyber security challenges

  • introduction to fundamental concepts that are central to understanding and reasoning about cyberspace, cyber security and related risks (with assignments)

  • learning by doing: practical demonstrations and exercises related to cyber-attack and defense

  • lectures on the basic working and governance of ICT systems (including the Internet)

  • lectures and exercises on (cyber) risk management (assessment & mitigation) approaches

  • lectures on “the human factor” of cyber security ((motives of the) people in the role of attacker, defender and that of end-user), including: -the rule of law -cyber economics -cyber terrorism

  • organizing cyber security in organisations

  • critical infrastructures and critical information infrastructures and their interdependencies

  • summary/outcomes:

    • (common) conceptualisations of cyberspace, cyber risks, cyber security challenges
    • use a few basic intelligence, attack and defense tools in a lab environment
    • apply a chosen cyber risk assessment or mitigation approach onto a new case study

Course objectives

When finalizing this course successfully, participants will have:

  • basic knowledge & understanding of what cyberspace entails (the world of "cyber activities"), the various sub-domains, the interwoven nature of virtual and real worlds (including cyber-physical systems), and related cyber security challenges

  • basic knowledge & understanding of how Internet works, the use and abuse of the Internet and the dependency on IT services in critical infrastructures, how society in all kinds of sub-domains has become (highly) dependent on IT services

  • basic knowledge of the governance of the Internet and involved stakeholders
    When finalizing this course successfully, participants will be able to:

  • identify various cyber risks (intentional and unintentional) and what impact they result into (e.g. legal, economical and, political impact)

  • (qualitatively) reason about the relations cyber threats-incidents-risks and possible counter measures to reduce existing cyber risks to accepted levels (bowtie thinking)

  • use a few basic intelligence, attack and defense tools in a lab environment (including the working of these tools and the possible consequences of their application)

  • apply a chosen cyber risk assessment or mitigation approach onto a new case study

Timetable

7 days from 9.30 until 17.00 in February and March 2019.

Mode of instruction

Lectures, seminars, exercises, class discussion

Lecturers: Prof.dr. Jan van den Berg, Dr. Els De Busser, Prof. Dr. Bibi van den Berg, Prof.dr. Dennis Broeders, Prof.dr. Michel van Eeten, Prof.dr. Edwin Bakker, and others

Course Load

5 EC

Assessment method

Assignments (60%), written exam (40%)

No compensation is possible for assignments of 30% or more. Only assessments with a weight under 30% are compensable. This means that one does not have to pass an assessment if it weighs less than 30% in order to pass the course, if the average of all assessments combined is at least a 5.5. In addition, assignments with less than 30% are not re-sitable, meaning that if one failed an assessment of less than 30%, one is not allowed to redo it.

Blackboard

Yes, for posting announcements, slides of lectures, relevant literature and assignments.

Reading list

Compulsory literature and literature for further consultation will be announced via Blackboard.

Registration

No registration is required for lectures and exams.

Contact

Dr. Els de Busser

Drs. Mireille Snels, programme manager

Remarks

For more information see website of the Cyber Security Academy.