Headings denoted with an asterisk ( * ) is retrieved from the course syllabus version Autumn 2022
Content and learning outcomes
Course contents
introduction to computer security
introduction to cryptography
authentication, access control, security models
intrusion detection, firewalls
malware: virus/worms/troyans
web attacks
system security, buffer overflow attacks, side channels
human factors, security audits, and social manipulation
selected current security related problems and technologies
Intended learning outcomes
After passing the course, the student shall be able to
identify threats against confidentiality, integrity and availability in digital systems
explain basic terminology and concepts in computer security and use them
find and use documentation of security related problems and tools
analyse simple program code and systems (based on given or self-made system descriptions) to identify vulnerabilities and predict corresponding threats
select countermeasures against identified threats and argue for their suitability
compare countermeasures and evaluate their side effects,
apply countermeasures
present and explain their reasoning to others,
in order to
be able to develop software and computer systems with security in mind
be able to move on and specialise in the cybersecurity area
assess the difficulty of a security problem in relation to their own ability to decide when they can handle it alone and when they need to consult an expert.
Preparations before course start
Literature
No information inserted
Support for students with disabilities
Students at KTH with a permanent disability can get support during studies from Funka:
LAB1 - Laboratory work, 3.0 credits, Grading scale: P, F
PRO1 - Project work, 1.5 credits, Grading scale: P, F
TEN1 - Written exam, 3.0 credits, Grading scale: A, B, C, D, E, FX, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
Ethical approach
All members of a group are responsible for the group's work.
In any assessment, every student shall honestly disclose any help received and sources used.
In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.