Prospectus

nl en

Technical Measures and Interventions

Course
2018-2019

Admission requirements

Admission only after intake, see the website of the Cyber Security Academy

Admission only for those students who are enrolled in the technical track

Description

In the first part of the course attention will be paid to present ICT and Industrial Control Systems as well as networks. Specific attention will be paid to their attacks and vulnerabilities. The second part of the course handles the security principles and the available technical security measures and their meaning for cyber security, both repressive and preventive. The basic security mechanisms as confidentiality, identification, integrity, authentication and authorisation are given. After a short introduction to (a)symmetric cryptography and key management the various cryptographic algorithms and methods for the various security mechanisms are considered as well as their corresponding (inter)national standards. Attention is paid to architecture models and standards and the technical aspects of the management of security services.
The role of datamining techniques for detection of anomalies and potential fraud is considered. Although most security measures are digital, finally physical security measures are necessary, e.g. secure key storage. We also look at security modules and the physical security of devices and side-channel attacks on e.g. smartcards.

Course objectives

Participants have:

  • understanding of the basics and characteristics of present ICT systems and networks, their vulnerabilities and their meaning in practice.

  • understanding of the basic security functions as confidentiality, integrity, authentication and access control

  • basic knowledge of datamining techniques for anomalies, fraud and intrusion detection

  • basic knowledge about the available cryptographic algorithms and standards for implementation of security functions as mentioned above

Participants are able to:

  • decide on the basis of technical requirements which cryptographic algorithms should be applied

  • design a system for intrusion detection on the basic of datamining techniques methods

  • explain and discuss technical aspects of choice of security measures with various kind of experts in organisations

Timetable

7 days from 9.30 until 17.00
Friday 19 October 2018
Thursday 1 November 2018
Friday 2 November 2018
Friday 9 November 2018
Friday 16 November 2018
Friday 23 November 2018
Friday 30 November 2018 (exam)

Mode of instruction

Lectures, seminars, exercises, class discussion
Lecturers: dr. Jan van der Lubbe (TUD), Renato Kuiper (i-to-i) and others

Course Load

5 EC

Assessment method

Assignment (20%), written exam (80%)

No compensation is possible for assignments of 30% or more. Only assessments with a weight under 30% are compensable. This means that one does not have to pass an assessment if it weighs less than 30% in order to pass the course, if the average of all assessments combined is at least a 5.5. In addition, assignments with less than 30% are not re-sitable, meaning that if one failed an assessment of less than 30%, one is not allowed to redo it.

Blackboard

Yes, for posting slides of lectures, relevant literature and assignments.

Reading list

Compulsory literature and literature for further consultation will be announced via Blackboard.

Registration

No registration is required for lectures and exams.

Contact

Dr. Jan van der Lubbe Drs. Mireille Snels, programme manager

Remarks

For more information, see the website of the Cyber Security Academy