Admission requirements
Admission only after intake, see website of the Cyber Security Academy.
Description
Aiming to avoid overlap with other courses (elective as well as mandatory courses) that are taught later in the curriculum, the content of this course is limited to the introductory stage. It seeks to offer students an understanding of what constitutes cyberspace, how its components work and why they matter. The following topics are included.
In a first step students will explore what cyberspace entails by conceptualizing cyberspace and analyzing several definitions of it. The three-layer model for conceptualizing cyberspace forms the guide for this course. Secondly, fundamental concepts that are central to understanding and reasoning about cyberspace are covered, as well as the link to cyber security and related risks. This is combined with (a) practical demonstration(s) and exercise(s) related to cyber-attacks and defense.
The course includes the basic technical aspects of the functioning of ICT systems, including the Internet. The history of the Internet, its basic architecture and governance are therefore the building blocks of this course. Questions that are dealt with include: What is a network? Who are the stakeholders of the Internet? How do we deal with the borderless nature of the Internet and of cyberspace?
In this respect, the basics of (cyber) risk management (assessment and mitigation) approaches are equally touched upon. Since these topics will elaborately return in later courses, only the basics of cyber security in organizations are covered. Also the fundamental particularities of critical infrastructures and their interdependencies (cascade effect) are included.
This course functions as a baseline for further courses and offers students the bigger picture of cyberspace, enabling them to put its components (technical as well as governance aspects), their functioning, their vulnerabilities and their protection into perspective.
Course objectives
When finalizing this course successfully, participants will have:
basic knowledge & understanding of what cyberspace entails (the world of "cyber activities") and why it is a complex socio-technical system;
basic knowledge & understanding of the various sub-domains of cyberspace and the interwoven nature of virtual and real worlds (including cyber-physical systems)
basic knowledge & understanding of how Internet works, the use and abuse of the Internet and the dependency on IT services in critical infrastructures
When finalizing this course successfully, participants will be able to:
identify various cyber risks (intentional and unintentional) and what impact they result into (e.g. legal, economical and, political impact)
reason about the relations cyber threats-incidents-risks and possible counter measures to reduce existing cyber risks to accepted levels (bowtie thinking)
use a few basic intelligence, attack and defense tools in a lab environment (including the working of these tools and the possible consequences of their application)
Timetable
7 days from 9.30 until 17.00 in February and March 2020.
Mode of instruction
Lectures, seminars, exercises, class discussion
Lecturers: Dr. Els De Busser, Prof. Dr. Bibi van den Berg and others
Course Load
5 EC
Assessment method
Assignment 1 (30%)
Assignment 2 (30%)
Written exam (40%)
Only assessments with the weight of 30% and lower are compensable. This means that one does not have to pass an assessment if it weighs 30% or less in order to pass the course, if the average of all assessments combined is at least a 5.5. In addition, assignments weighing up to and including 30% are not re-sitable, meaning that if one failed an assessment of 30% or less one is not allowed to redo it and that assessment must be compensated by the other assessment(s).
The resit will take the same form.
Blackboard
Yes, for posting announcements, slides of lectures, relevant literature and assignments.
Reading list
Compulsory literature and literature for further consultation will be announced via Blackboard.
Registration
No registration is required for lectures and exams.
Contact
Chantal de Groot, study coordinator
Remarks
For more information see the website of the Cyber Security Academy.