Studiegids

nl en

Technical Measures and Interventions

Vak
2019-2020

Admission requirements

Admission only after intake, see website of the Cyber Security Academy.
Admission only for those who are enrolled in the technical track.

Description

In the first part of the course attention will be paid to present ICT and Industrial Control Systems as well as networks. Specific attention will be paid to their attacks and vulnerabilities. The second part of the course handles the security principles and the available technical security measures and their meaning for cyber security, both repressive and preventive. The basic security mechanisms as confidentiality, identification, integrity, authentication and authorisation are given. After a short introduction to (a)symmetric cryptography and key management the various cryptographic algorithms and methods for the various security mechanisms are considered as well as their corresponding (inter)national standards. Attention is paid to architecture models and standards and the technical aspects of the management of security services.

The role of datamining techniques for detection of anomalies and potential fraud is considered. Although most security measures are digital, finally physical security measures are necessary, e.g. secure key storage. We also look at security modules and the physical security of devices and side-channel attacks on e.g. smartcards.

Course objectives

Participants have:

  • understanding of the basics and characteristics of present ICT systems and networks, their vulnerabilities and their meaning in practice.

  • understanding of the basic security functions as confidentiality, integrity, authentication and access control

  • basic knowledge of datamining techniques for anomalies, fraud and intrusion detection

  • basic knowledge about the available cryptographic algorithms and standards for implementation of security functions as mentioned above

Participants are able to:

  • decide on the basis of technical requirements which cryptographic algorithms should be applied

  • design a system for intrusion detection on the basic of datamining techniques methods

  • explain and discuss technical aspects of choice of security measures with various kind of experts in organisations

Timetable

7 days from 9.30 until 17.00:

Friday 18 October 2019
Friday 1 November 2019
Friday 8 November 2019
Friday 15 November 2019
Friday 22 November 2019
Friday 29 November 2019
Friday 6 December 2019 (exam)

Mode of instruction

Lectures, seminars, exercises, class discussion
Lecturers: dr. Jan van der Lubbe (TUD) and others

Course Load

5 EC

Assessment method

  • Assignment (20%)

  • Written exam (80%)

Only assessments with the weight of 30% and lower are compensable. This means that one does not have to pass an assessment if it weighs 30% or less in order to pass the course, if the average of all assessments combined is at least a 5.5. In addition, assignments weighing up to and including 30% are not re-sitable, meaning that if one failed an assessment of 30% or less one is not allowed to redo it and that assessment must be compensated by the other assessment(s).

The resit will take the same form.

Blackboard

Yes, for posting slides of lectures, relevant literature and assignments.

Reading list

Compulsory literature and literature for further consultation will be announced via Blackboard.

Registration

No registration is required for lectures and exams.

Contact

Dr. Jan van der Lubbe Chantal de Groot, study coordinator

Remarks

For more information see the website of the Cyber Security Academy.