Foundations of Information Security
2008-2009 - IMT4541 - 5sp

Forventet læringsutbytte

Students who have passed this course should:
- have acquired good knowledge of the common terminology
and security models in information security
- have an understanding of access control models and
mechanisms, including of underlying computational
models
- understand the capabilities and limitations of
developmental assurance techniques
- understand the capabilities and limitations of
evaluation techniques for secure systems

Emnets temaer

- Core terminology for information security
- Identification and authentication principles
- Access control mechanisms
- Security models
- Developmental assurance methods
- Security evaluation methods and standards

Pedagogiske metoder

Forelesninger
Oppgaveløsning
Annet

Pedagogiske metoder (fritekst)

Annet - Tutorials

Vurderingsformer

Skriftlig eksamen, 3 timer

Karakterskala

Bokstavkarakterer, A (best) - F (ikke bestått)

Sensorordning

Evaluated by the lecturer.

Utsatt eksamen (tidl. kontinuasjon)

The whole subject must be repeated.

Tillatte hjelpemidler (gjelder kun skriftlig eksamen)

Approved calculator

Obligatoriske arbeidskrav

None

Læremidler

Books:

- M. Bishop: Computer Security: Art and Science.
Addison-Wesley, Reading, MA, USA (2002)

- D. Gollmann: Computer Security, 2nd ed.
John Wiley & Sons, New York, NY, USA (2006)

Erstatter

IMT4162 Information Security and Security Architecture