Information must be protected for several reasons. Some information must be protected from eavesdroppers and some from unauthorized modification. Users must be authenticated and access to information must be controlled. At the same time, the number of Internet connected devices are increasing and so is the amount of information that we are able to access online. This course will give an introduction to the problems we are facing when designing security for computers, mobile devices and web applications. It will also give an overview of the solutions to these problems. The course focus will be on concepts and ideas, not on technical details. Still, the goal is to provide a good understanding of building blocks, attacks, and defenses. It is suitable for anyone that wants to have an increased general understanding of information security and how it affects the systems and products that we interact with in everyday life.
WHO SHOULD ATTEND
Anyone who would like to understand how to protect your own data, in business or privately, will benefit from this course. The course focus will be on concepts and ideas, not on technical details. This means that you dont need a technical background for finding the course useful.
- Password security
- Principles for protecting stored and transmitted data
- Data integrity
- Security features in computers and applications
- Email security
- Internet anonymity
- Security in electronic payment solutions
- Security in Internet applications
On completion of the course the student should be able to:
- discuss security aspects in an informed way
- understand design decisions related to security
- understand basic security principles on the Internet
- understand how security can be broken
- understand common ways of protecting computers and systems against attacks
- distinguish different security measures and explain where and why they are used
- understand how web accounts can be hijacked and how to protect against this
Martin Hell is an Associate Professor at the Department of Electrical and Information Technology. He has a Ph.D. in Information Theory and has been teaching various courses in computer and web security for more than 10 years. In his research in security and cryptography, he has published more than 40 articles in international conferences and journals.
TEACHING AND ASSESSMENT
Teaching takes the form of lectures. Assessment is based on home exercises and written assignments. Students are awarded one of the following grades: Fail, Pass or Pass with Distinction.
Given upon reqest
Lund University, Lund, Sweden
17.500 SEK, excluding VAT. The course fee includes tuition and documentation in the form of printed lecture slides and diploma.
Time schedule and setup
One half day per week. The course will be studied together with exchange students at Lund University.
For course information, please contact
Lund University Faculty of Engineering,
+46 222 43 53
For practical information, please contact
Lund University Commissioned Education,
+46 222 07 54