Inhalt

[ 921NESEIISV13 ] VL Introduction to IT Security

Versionsauswahl
Workload Education level Study areas Responsible person Hours per week Coordinating university
3 ECTS M1 - Master's programme 1. year Computer Science René Mayrhofer 2 hpw Johannes Kepler University Linz
Detailed information
Original study plan Master's programme Computer Science 2025W
Learning Outcomes
Competences
Students can independently analyze threats to IT systems and design respective mitigations through a combination of different security methods. They are able to effectively communicate with other subject matter experts through knowledge of appropriate common terminology.
Skills Knowledge
  • Understand the most important, high-level aspects of security in IT systems and networks and how they interact (K5)
  • Know the correct terminology to communicate with other experts (K4)
  • Understand the difference between technical and organizational security aspects and when each are appropriate (K5)
  • Understand different technical security methods and how they can be applied to practical problems (K6), including cryptography (K4), user authentication (K5), secure coding (K2), access control models (K5), and network security architectures (K4)
  • Position security requirements with regards to the wider system context and balance with others such as usability, privacy, or safety (K5)
  • Threat scenarios and models
  • Risks analysis
  • Organizational security processes
  • Basic concepts of cryptography and classification of cryptographic primitives
  • Identification and authentication methods
  • Access control models and operating systems
  • Network and protocol security
  • Code security
  • Usability of security methods
  • Privacy concerns
Criteria for evaluation Written exam
Methods Lecture and discussion
Language English
Study material no compulsory reading; supplemental literature:

  • William Stallings, Lawrie Brown: "Computer Security: Principles and Practices", Pearson
  • William Stallings: "Cryptography and Network Security: Principles and Practice", Prentice Hall/Pearson
  • Ross Anderson: "Security Engineering", Wiley
Changing subject? No
Further information https://www.jku.at/en/institute-of-networks-and-security/
Corresponding lecture INMNPVOEITS: VO Einführung IT-Sicherheit (3 ECTS)
On-site course
Maximum number of participants -
Assignment procedure Direct assignment