Vanwege de coronamaatregelen kan de onderwijsvorm of tentaminering afwijken. Zie voor actuele informatie de betreffende cursuspagina’s op Brightspace.

Studiegids

nl en

Case Studies in Cyber Security

Vak
2018-2019

Admission requirements

Admission only after intake, see website of the Cyber Security Academy
Admission only for those students who are enrolled in the technical track.

Description

In this course attention is paid briefly to the processing of sensitive data based on cryptography and the usage of anonymisation techniques.
In addition to this, this course deals with security management, security design principles, security in architecture and resilience engineering.
Whereas in modules Measures and Interventions and Ict systems of the technical track attention was paid to the characteristics of ICT systems, types of attacks and possible security measures, the main aim of this course is that students translate and apply their theoretical /technical knowledge in a specific case (to be determined on the basis of the background and interests of the students, or the actual situation). Last years the cases were related to data integrity in the cloud, internet of things and block chain technology. In groups of 3-4 students, participants design a security architecture and system for the chosen case. They should write a primarily technical report, taking non-technical aspects and possible impact into account. In addition to the report the students should give a presentation for both staff and their colleague-groups.

Course objectives

Participants have:

  • understanding of cyber threats and vulnerabilities, incidents and their potential impact

Participants are able to:

  • identify in a practical case possible attacks, translate them to technical requirements, and the latter to security measures, taking the non-technical aspects into account

  • translate and apply theoretical knowledge of cyber security to professional practice

  • weigh business and security risks and to define technical requirements

  • • translate technical understanding into a multidisciplinary oriented policy

Timetable

7 days from 9.30 until 17.00 in February and March 2019

Mode of instruction

Lectures, seminars, exercises, class discussion
Lecturers: dr. Jan van der Lubbe, dr. Christian Doerr (TUD), dr. Wojtek Kowalczyk and others.

Course Load

5 EC

Assessment method

Assignments (80%), presentation (20%)
No compensation is possible for assignments of 30% or more. Only assessments with a weight under 30% are compensable. This means that one does not have to pass an assessment if it weighs less than 30% in order to pass the course, if the average of all assessments combined is at least a 5.5. In addition, assignments with less than 30% are not re-sitable, meaning that if one failed an assessment of less than 30%, one is not allowed to redo it.

Blackboard

Yes, for posting slides of lectures, relevant literature and assignments.

Reading list

Compulsory literature and literature for further consultation will be announced via Blackboard.

Registration

No registration is required for lectures and exams.

Contact

Dr. Jan van der Lubbe (TUD) Drs. Mireille Snels, programme manager

Remarks

For more information see the website of the Cyber Security Academy