Syllabus

Data Security and Integrity

Code
GIK2V4
Points
7.5 Credits
Level
First Cycle
School
School of Information and Engineering
Subject field
Information Systems (IKA)
Group of Subjects
Informatics/Computer and Systems Sciences
Disciplinary Domain
Technology, 100%
This course can be included in the following main field(s) of study
Computer Engineering1
Information Systems2
Microdata Analysis3
Progression indicator within (each) main field of study
1G1N
2G1N
3G1N
Approved
Approved, 01 March 2022.
This syllabus is valid from 01 March 2022.

Learning Outcomes

The overall aim of the course is to introduce students to cybersecurity trends, threats when using IT against personal and company data, and how we can detect and protect us from these threats. The course aims to provide an understanding of  the various actors that exist in the world of cybersecurity and what it is that drives both cybercriminals and security experts.

Knowledge and understanding

After completing the course, students will be able to:

  • Describe the characteristics of cybercriminals and specialists within the field of cybersecurity.
  • Describe the techniques and methods that cybercriminals use in their attempts to gain access to an organization‘s protected assets
  • Describe the technology, processes, policies and standards used within organisations to combat cybercrime to protect all the organisation’s assets
  • Describe the significance of upholding the principles of confidentiality, integrity and accessibility for an organisation in its ability to combat cyber crime
  • Describe the strategies and methods used to comply with systematic cyber security work

Skills and Abilities
After completing the course, students will be able to:

  • Present, explain, summarise, and discuss solution methods and results
  • Install and configure a virtual machine
  • Analyse security needs within a home or a medium-sized corporate network and, both in theory and in practice implement suitable solutions for the protection of networks, devices, software, data, and information

Course Content

The course deals with basic terms in the field of cyber security.
This includes descriptions of the characteristics of both cybercriminals and cyber security experts, linked to the methods and techniques they use.
Furthermore, the course sheds light on the principles of the CIA triad and its connection to countermeasures against cyber security threats. Closing key concepts are legislation, ethics, and morality within the cyber security area and systematic cyber security work.

Assessment

  • Labs (4 credits)
  • Assignment (3.5 credits)

Forms of Study

Lectures and exercises.

Grades

The Swedish grades U–G.

Prerequisites

  • General entry requirements

Other Information

Replaces IK1080.

This course, when taught online, uses a Windows environment. Other operating systems can be used; however, the University cannot provide assistance or support with these. Students require internet connection of at least 2Mbit/s. They also require a webcam and a headset or microphone. All activities performed via Cisco Packet Tracer assume that students have the latest version of Cisco Packet Tracer installed on their computer.