Introduction to Information Security
Learning Outcomes:
- Understanding basic concepts of information security and the historical perspective of classical cryptography
- Exploring fundamental cryptographic techniques including symmetric key cryptography, stream ciphers, and block ciphers
- Continuing with symmetric key cryptography, introduction to integrity mechanisms, hash functions, and public key cryptography
- Understanding the applications of cryptographic methods, particularly digital signatures and blockchain technologies
- Learning about identification and authentication processes, including the use of various biometric technologies
- Studying security protocols with a focus on authentication and key establishment, including the Kerberos protocol
- Exploring the fundamentals of access control in computer security and different models of access control systems
- Gaining insight into OS security measures, with a focus on access control in Unix and Windows operating systems
- Learning about software security issues, focusing on malware and buffer overflow attacks, and their prevention methods
- Covering basics of network security, including network protocols, architecture, firewalls, and secure communication using TLS
- Continuing with network security, including detailed discussions on firewall types, intrusion detection systems, and IPsec for virtual private networks
Skills for module:
Cyber-Security
Cryptography
Mathematics
Problem Solving
Critical Thinking
Time Management
Security
Introduction to Information Security
IY2760
Learning Outcomes
- Understanding basic concepts of information security and the historical perspective of classical cryptography
- Exploring fundamental cryptographic techniques including symmetric key cryptography, stream ciphers, and block ciphers
- Continuing with symmetric key cryptography, introduction to integrity mechanisms, hash functions, and public key cryptography
- Understanding the applications of cryptographic methods, particularly digital signatures and blockchain technologies
- Learning about identification and authentication processes, including the use of various biometric technologies
- Studying security protocols with a focus on authentication and key establishment, including the Kerberos protocol
- Exploring the fundamentals of access control in computer security and different models of access control systems
- Gaining insight into OS security measures, with a focus on access control in Unix and Windows operating systems
- Learning about software security issues, focusing on malware and buffer overflow attacks, and their prevention methods
- Covering basics of network security, including network protocols, architecture, firewalls, and secure communication using TLS
- Continuing with network security, including detailed discussions on firewall types, intrusion detection systems, and IPsec for virtual private networks