Admission requirements
Admission only after intake, see the website of the Cyber Security Academy
Admission only for those students who are enrolled in the technical track
Description
In the first part of the course attention will be paid to present ICT and Industrial Control Systems as well as networks. Specific attention will be paid to their attacks and vulnerabilities. The second part of the course handles the security principles and the available technical security measures and their meaning for cyber security, both repressive and preventive. The basic security mechanisms as confidentiality, identification, integrity, authentication and authorisation are given. After a short introduction to (a)symmetric cryptography and key management the various cryptographic algorithms and methods for the various security mechanisms are considered as well as their corresponding (inter)national standards. Attention is paid to architecture models and standards and the technical aspects of the management of security services.
The role of datamining techniques for detection of anomalies and potential fraud is considered. Although most security measures are digital, finally physical security measures are necessary, e.g. secure key storage. We also look at security modules and the physical security of devices and side-channel attacks on e.g. smartcards.
Course objectives
Participants have:
understanding of the basics and characteristics of present ICT systems and networks, their vulnerabilities and their meaning in practice.
understanding of the basic security functions as confidentiality, integrity, authentication and access control
basic knowledge of datamining techniques for anomalies, fraud and intrusion detection
basic knowledge about the available cryptographic algorithms and standards for implementation of security functions as mentioned above
Participants are able to:
decide on the basis of technical requirements which cryptographic algorithms should be applied
design a system for intrusion detection on the basic of datamining techniques methods
explain and discuss technical aspects of choice of security measures with various kind of experts in organisations
Timetable
7 days from 9.30 until 17.00
Friday 19 October 2018
Thursday 1 November 2018
Friday 2 November 2018
Friday 9 November 2018
Friday 16 November 2018
Friday 23 November 2018
Friday 30 November 2018 (exam)
Mode of instruction
Lectures, seminars, exercises, class discussion
Lecturers: dr. Jan van der Lubbe (TUD), Renato Kuiper (i-to-i) and others
Course Load
5 EC
Assessment method
Assignment (20%), written exam (80%)
No compensation is possible for assignments of 30% or more. Only assessments with a weight under 30% are compensable. This means that one does not have to pass an assessment if it weighs less than 30% in order to pass the course, if the average of all assessments combined is at least a 5.5. In addition, assignments with less than 30% are not re-sitable, meaning that if one failed an assessment of less than 30%, one is not allowed to redo it.
Blackboard
Yes, for posting slides of lectures, relevant literature and assignments.
Reading list
Compulsory literature and literature for further consultation will be announced via Blackboard.
Registration
No registration is required for lectures and exams.
Contact
Dr. Jan van der Lubbe Drs. Mireille Snels, programme manager
Remarks
For more information, see the website of the Cyber Security Academy