Prospectus

nl en

Case Studies in Cyber Security

Course
2023-2024

Admission requirements

Admission only after intake, please see our website

Admission only for those students who are enrolled in the technical track.

Description

This course is a showcase of different case studies and applications in cyber security. It provides a guided exploration of several important topics, building on knowledge and experience obtained in the previous courses of the programme. The main goal is that students translate and apply their theoretical knowledge and technical skills in specific case studies.
Case studies are selected each year to reflect important industry developments and complement the programme. Among the topics that we can explore in this course are mobile system security, threat modeling, cyber threat intelligence, data security in the cloud, and blockchain security.
This course also pays attention to scientific research design and technical report writing. Students will design their own case study on a topic of their choice, and write a report about this investigation. They will write a primarily technical report, formulating a research question, reporting their findings and positioning these findings with respect to the state of the art. Students will also develop a comprehensive security policy proposal for an organization, outlining not only technical, but also governance, legal, and human behavior-related policy considerations. In addition to the report, the students will give a presentation about their findings to both staff and their colleagues.

Course objectives

Participants have: ● an understanding of cyber threats and vulnerabilities, incidents and their potential impact in different application domains

Participants are able to: ● identify in a practical case possible cyber threats, translate them to technical requirements, and the latter to security measures, taking the non-technical aspects into account ● translate and apply theoretical knowledge of cyber security to professional practice ● weigh business and security risks and to define technical requirements ● translate technical understanding into a multidisciplinary security policy

Timetable

7 days from 9.30 until 17.00

8-2-2024
9-2-2024
1-3-2024
8-3-2024
15-3-2024
22-3-2024
5-4-2024

Mode of instruction

Lectures, seminars, exercises, class discussion
Lecturers: Dr. Olga Gadyatskaya (Leiden Inst. Advanced Computer Sciences) and Dr. Zeki Erkin (TU Delft)

Assessment method

presentation of individual project
*20% of final grade
*grade must be compensated
*re-sit not possible

report on individual project
*45% of final grade
*grade must be 5.50 or higher to pass the course
*re-sit of a fail is possible
*Re-sit will take the same form

report on one of case studies
*35% of final grade
*grade must be 5.50 or higher to pass the course
*re-sit of a fail is possible
*re-sit will take the same form

Only assessments with the weight of 30% and lower are compensable. This means that one does not have to pass an assessment if it weighs 30% or less in order to pass the course, if the average of all assessments combined is at least a 5.5. In addition, assignments weighing up to and including 30% cannot be re-taken, meaning that if one failed an assessment of 30% or less one is not allowed to redo it and that assessment must be compensated by the other assessment(s).

Reading list

Compulsory literature and literature for further consultation will be announced via Brightspace

Registration

No registration is required for lectures and exams.

Contact

Dr. Olga Gadyatskaya M.I.Warner, study coordinator

Remarks

For more information see the website see our website