Prospectus

nl en

Technical Measures and Interventions

Course
2017-2018

Admission requirements

Admission only after intake, see the website of the Cyber Security Academy
Admission only for those students who are enrolled in the technical track

Description

In the first part of the course attention will be paid to present ICT and Industrial Control Systems as well as networks. Specific attention will be paid to their attacks and vulnerabilities. The second part of the course handles the security principles and the available technical security measures and their meaning for cyber security, both repressive and preventive. The basic security mechanisms as confidentiality, identification, integrity, authentication and authorisation are given. After a short introduction to (a)symmetric cryptography and key management the various cryptographic algorithms and methods for the various security mechanisms are considered as well as their corresponding (inter)national standards. Attention is paid to architecture models and standards and the technical aspects of the management of security services.
The role of datamining techniques for detection of anomalies and potential fraud is considered. Although most security measures are digital, finally physical security measures are unavailable, e.g. secure key storage. We also look at security modules and the physical security of devices and attacks on e.g. smartcards.

Course objectives

Participants have:

  • understanding of the basics and characteristics of present ICT systems and networks, their vulnerabilities and their meaning in practice.

  • understanding of the basic security functions as confidentiality, identification, authentication and access control

  • basic knowledge of datamining techniques for anomalies, fraud and intrusion detection

  • basic knowledge about the available cryptographic algorithms and standards for implementation of security functions as mentioned above

  • Participants are able to

  • decide on the basis of technical requirements which cryptographic algorithms should be applied

  • design a system for intrusion detection on the basic of datamining techniques methods

  • explain and discuss technical aspects of choice of security measures with various kind of experts in organisations

Timetable

7 days from 9.30 until 17.00
Friday October 27, 2017
Thursday November 2, 2017
Friday November 3, 2017
Friday November 10, 2017
Friday November 17, 2017
Friday November 24, 2017
Friday December 1, 2017 (exam)

Mode of instruction

Lectures, seminars, exercises, class discussion
Lecturers: dr. Jan van der Lubbe (TUD), dr. Wojtek Kowalczyk, Rentao Kuiper (VKA) and others

Course Load

6 EC

Assessment method

Assignment (20%), written exam (80%)
No compensation is possible for assignments of 30% or more.

Blackboard

Yes, for posting slides of lectures, relevant literature and assignments

Reading list

Compulsory literature and literature for further consultation will be announced via Blackboard

Registration

No registration is required for lectures and exams.

Contact

Dr. Jan van der Lubbe Drs. Mireille Snels, programme manager

Remarks

For more information, see the website of the Cyber Security Academy