- Stallings, William and Brown, Lawrie (2018), Computer Security: Principles and Practice, 4th Edition, Global Edition. Pearson Education Limited.
Reference literature:
- Anderson, Ross (2021), Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition.
- Chapple, Mike, Stewart Michael James & Gibson, Darril (2018), (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Isc Official Study Guides), 8th Edition, Sybex.
- Gollmann, Dieter (2011), Computer Security, John Wiley & Sons, 3rd Edition.
Information Security
About the course
The objective of the course is for the student to develop an understanding of how vulnerabilities and threats affect the digital environment, as well as how methods and models can be designed to protect important information there.
Course content
- The digital environment
- Objectives of information security
- Models for threat and risk analysis
- User authentication and access control
- Malicious software and application attacks
- Protection mechanisms and security management
- Ethical perspectives on information security
Entry requirements and selection
Entry requirements
45 higher education credits in Computer and Information Science or Computer Science including 7.5 higher education credits in programming and
- the course DA297A: Database Technology and
- the course DA211A: Introduction to Studies in Computer Science alternatively DA154A: Introduction to Computer Science alternatively DA380A: Computer Science: Gaming Studies
Besides the formal requirements listed above it's also presumed that the student have knowledge from the course DA109A
Selection
100% University credits completed
Course literature
Course evaluation
The University provides students who are taking or have completed a course, the opportunity to share their experiences of and opinions about the course, in the form of a course evaluation that is arranged by the University. The University compiles the course evaluations and notifies the results and any decisions regarding actions brought about by the course evaluations. The results shall be kept available for the students. (HF 1:14)