As the digital world and physical world become more and more interconnected, it becomes increasingly important to develop methods to maintain security in the digital world. Governments, corporations and individuals all have different cyber security needs, and how we meet those needs is of critical importance in our modern world.
In this course, we will study the main issues surrounding cyber security. We will study the core principles of cyber security, debate the trade-off implications of different methodologies, and discuss critical topics that are relevant to our current understanding of cyber security.
More specifically, we will focus on:
understanding the key terms needed to discuss cyber security
the opponent and what they want
cryptography and cryptanalysis
attack and system modeling
security and risk management
This course is intended for students with a strong interest in security topics. While a background in computer science broadly may be beneficial, it is not expected nor required.
Students will develop an awareness of the main concepts and principles of cyber security.
- Understanding of the key vocabulary
- Understanding of basic attack structures
- Understanding of basic defense structures
Students will identify technical security requirements for different types of systems and understand the trade-offs that arise due to these requirements.
- Students can analyze structures for security requirements
- Students can argue for the necessity of some security requirements over
Students will understand the socio-technical view on security and privacy that
encompasses not only technical but also societal aspects.
The most updated version of the timetables can be found on the students' website:
Mode of instruction
Lecture, discussion, assignments and exam
There will be a written examination with close and short questions. There will also be 2 assignments.
The final grade for the course will be the weight average of 60% examination and 40% assignments. Both components need to be at least 5.0, and the final grade should be at least 5.5 to pass the course.
It will be possible to retake the exam.
It will not be possible to resubmit assignments.
The teacher will inform the students how the inspection of and follow-up discussion of the exams will take place.
Recommended textbook: Ross Anderson “Security Engineering: A Guide to Building Dependable Distributed Systems”. Information is available here https://www.cl.cam.ac.uk/~rja14/book.html
Note that this textbook is recommended, but not required.
Other literature and reading materials will be announced during the course.
In MyTimetable kun je alle vak- en opleidingsroosters vinden, waarmee jij je persoonlijke rooster kunt samenstellen. Onderwijsactiviteiten waarvoor je in uSis staat ingeschreven, worden automatisch in je rooster getoond. Daarnaast kun je My Timetable gemakkelijk koppelen aan een agenda-app op je telefoon en worden roosterwijzigingen automatisch in je agenda doorgevoerd; bovendien ontvang je desgewenst per e-mail een notificatie van de wijziging.
Voor meer informatie over Brightspace kun je op deze link klikken om de handleidingen van de universiteit te bekijken. Bij overige vragen of problemen kan contact opgenomen worden met de helpdesk van de universiteit Leiden.
Onderwijscoördinator Informatica, Riet Derogee
Interest in information technology and its security issues is desired.