Admission requirements
Admission only after intake, please see our website.
Admission only for those who are enrolled in the technical track.
Description
In the first part of the course attention will be paid to present ICT and Industrial Control Systems as well as networks. Specific attention will be paid to their attacks and vulnerabilities. The second part of the course handles the security principles and the available technical security measures and their meaning for cyber security, both repressive and preventive. The basic security mechanisms as confidentiality, identification, integrity, authentication and authorisation are given. After a short introduction to (a)symmetric cryptography and key management the various cryptographic algorithms and methods for the various security mechanisms are considered as well as their corresponding (inter)national standards. Attention is paid to architecture models and standards and the technical aspects of the management of security services.
The role of datamining techniques for detection of anomalies and potential fraud is considered. Although most security measures are digital, finally physical security measures are necessary, e.g. secure key storage. We also look at security modules and the physical security of devices and side-channel attacks on e.g. smartcards.
Course objectives
Participants have:
understanding of the basics and characteristics of present ICT systems and networks, their vulnerabilities and their meaning in practice.
understanding of the basic security functions as confidentiality, integrity, authentication and access control
basic knowledge of datamining techniques for anomalies, fraud and intrusion detection
basic knowledge about the available cryptographic algorithms and standards for implementation of security functions as mentioned above
Participants are able to:
decide on the basis of technical requirements which cryptographic algorithms should be applied
design a system for intrusion detection on the basic of datamining techniques methods
explain and discuss technical aspects of choice of security measures with various kind of experts in organisations
Timetable
On the right-hand side of the programme front page of the E-Prospectus you will find a link to the online timetables.
Mode of instruction
Lectures, seminars, exercises, class discussion.
Lecturers: dr. Stjepan Picek (TU Delft) and others.
Assessment method
Assignment
20% of final grade
Grade must be compensated
re-sit not possible
Written exam
80% of final grade
Grade must be 5.50 or higher to pass the course
Re-sit of a fail is possible.
Re-sit will take the same form
Only assessments with the weight of 30% and lower are compensable. This means that one does not have to pass an assessment if it weighs 30% or less in order to pass the course, if the average of all assessments combined is at least a 5.5. In addition, assignments weighing up to and including 30% cannot be re-taken, meaning that if one failed an assessment of 30% or less, one is not allowed to redo it and that assessment must be compensated by the other assessment(s).
Reading list
Compulsory literature and literature for further consultation will be announced via Brightspace.
Registration
No registration is required for lectures and exams.
Contact
Dr. Stjepan Picek study coordinator
Remarks
For more information see our website.