Prospectus

nl en

Introduction to cyberspace

Course
2017-2018

Admission requirements

Admission only after intake, see website of the Cyber Security Academy.

Description

  • exploring what cyberspace entails: first explorations in conceptualising cyberspace, its working, cyber risks, and cyber security challenges

  • introduction to fundamental concepts that are central to understanding and reasoning about cyberspace, cyber security and related risks (with assignments)

  • learning by doing: practical demonstrations and exercises related to cyber attack and defense

  • lectures on the basic working and governance of ITC systems (including the Internet)

  • lectures and exercises on (cyber) risk management (assessment & mitigation) approaches

  • lectures “the human factor” of cyber security ((motives of the) people in the role of attacker, defender and that of end-user) Including: the rule of law; cyber economics; cyber terrorism; and organizing cyber security in organisations

  • critical infrastructures and critical information infrastructures and their interdependencies

In conclusion the course covers the following:

  • (common) conceptualisations of cyberspace, cyber risks, cyber security challenges

  • use a few basic intelligence, attack and defense tools in a lab environment

  • apply a chosen cyber risk assessment or mitigation approach onto a new case study

Course objectives

Participants have:

  • basic knowledge & understanding of what cyberspace entails (the world of "cyber activities"), the various sub-domains, the interwoven nature of virtual and real worlds (including cyber-physical systems), and related cyber security challenges

  • basic knowledge & understanding of how Internet works, the use and abuse of the Internet and the dependency on IT services in critical infrastructures, how society in all kinds of sub-domains has become (highly) dependent on IT services

  • basic knowledge of the governance of the Internet and involved stakeholders

Participants are able to:

  • identify various cyber risks (intentional and unintentional) and what impact they result into (e.g. legal, economical and, political impact)

  • (qualitatively) reason about the relations cyber threats-incidents-risks and possible counter measures to reduce existing cyber risks to accepted levels (bowtie thinking)

  • use a few basic intelligence, attack and defense tools in a lab environment (including the working of these tools and the possible consequences of their application)

  • apply a chosen cyber risk assessment or mitigation approach onto a new case study

Timetable

7 days from 9.30 until 17.00

Thursday February 1, 2018
Friday February 2, 2018
Friday February 9, 2018
Friday February 16, 2018
Friday February 23, 2018
Friday March 9, 2018
Friday March 16, 2018

Mode of instruction

Lectures, seminars, exercises, and class discussions.
Lecturers: Prof.dr. Jan van den Berg, Dr. Bibi van den Berg, Prof.dr. Dennis Broeders, Prof.dr. Michel van Eeten, Prof.dr. Edwin Bakker, and others

Course Load

5 EC

Assessment method

assignments (60%), written exam (40%)
No compensation is possible for assignments of 30% or more.

Blackboard

Yes, for posting slides of lectures, relevant literature and assignments

Reading list

Compulsory literature and literature for further consultation will be announced via Blackboard

Registration

No registration is required for lectures and exams.

Contact

Prof.dr. Jan van den Berg Drs. Mireille Snels, programme manager

Remarks

For more information see website of the Cyber Security Academy.