Foundations of Information Security
2008-2009
-
IMT4541
- 5sp
Forventet læringsutbytte
Students who have passed this course should:
- have acquired good knowledge of the common terminology
and security models in information security
- have an understanding of access control models and
mechanisms, including of underlying computational
models
- understand the capabilities and limitations of
developmental assurance techniques
- understand the capabilities and limitations of
evaluation techniques for secure systems
Emnets temaer
- Core terminology for information security
- Identification and authentication principles
- Access control mechanisms
- Security models
- Developmental assurance methods
- Security evaluation methods and standards
Pedagogiske metoder
Forelesninger
Oppgaveløsning
Annet
Pedagogiske metoder (fritekst)
Annet - Tutorials
Vurderingsformer
Skriftlig eksamen, 3 timer
Karakterskala
Bokstavkarakterer, A (best) - F (ikke bestått)
Sensorordning
Evaluated by the lecturer.
Utsatt eksamen (tidl. kontinuasjon)
The whole subject must be repeated.
Tillatte hjelpemidler (gjelder kun skriftlig eksamen)
Approved calculator
Obligatoriske arbeidskrav
None
Læremidler
Books:
- M. Bishop: Computer Security: Art and Science.
Addison-Wesley, Reading, MA, USA (2002)
- D. Gollmann: Computer Security, 2nd ed.
John Wiley & Sons, New York, NY, USA (2006)
Erstatter
IMT4162 Information Security and Security Architecture