Introduction to Information Security

Learning Outcomes:

  • Understanding basic concepts of information security and the historical perspective of classical cryptography
  • Exploring fundamental cryptographic techniques including symmetric key cryptography, stream ciphers, and block ciphers
  • Continuing with symmetric key cryptography, introduction to integrity mechanisms, hash functions, and public key cryptography
  • Understanding the applications of cryptographic methods, particularly digital signatures and blockchain technologies
  • Learning about identification and authentication processes, including the use of various biometric technologies
  • Studying security protocols with a focus on authentication and key establishment, including the Kerberos protocol
  • Exploring the fundamentals of access control in computer security and different models of access control systems
  • Gaining insight into OS security measures, with a focus on access control in Unix and Windows operating systems
  • Learning about software security issues, focusing on malware and buffer overflow attacks, and their prevention methods
  • Covering basics of network security, including network protocols, architecture, firewalls, and secure communication using TLS
  • Continuing with network security, including detailed discussions on firewall types, intrusion detection systems, and IPsec for virtual private networks

Skills for module:

Cyber-Security

Cryptography

Mathematics

Problem Solving

Critical Thinking

Time Management

Security

Introduction to Information Security

IY2760

Learning Outcomes

  • Understanding basic concepts of information security and the historical perspective of classical cryptography
  • Exploring fundamental cryptographic techniques including symmetric key cryptography, stream ciphers, and block ciphers
  • Continuing with symmetric key cryptography, introduction to integrity mechanisms, hash functions, and public key cryptography
  • Understanding the applications of cryptographic methods, particularly digital signatures and blockchain technologies
  • Learning about identification and authentication processes, including the use of various biometric technologies
  • Studying security protocols with a focus on authentication and key establishment, including the Kerberos protocol
  • Exploring the fundamentals of access control in computer security and different models of access control systems
  • Gaining insight into OS security measures, with a focus on access control in Unix and Windows operating systems
  • Learning about software security issues, focusing on malware and buffer overflow attacks, and their prevention methods
  • Covering basics of network security, including network protocols, architecture, firewalls, and secure communication using TLS
  • Continuing with network security, including detailed discussions on firewall types, intrusion detection systems, and IPsec for virtual private networks