• Cyber Security (TTC1020-3020),
         01.12.2022 – 31.01.2023,  4 cr  (ZJA22STIDI) — Online learning +-
    Learning outcomes of the course
    You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security.

    You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information.
    You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
    Prerequisites and co-requisites
    Use and Command of Linux
    Basics in Programming
    Data Networks
    Course contents
    Introduction to cyber security
    - Current situation and phenomena
    - Terminology

    Social cyber security
    - Legislation, standards, licences
    - Information security and influencing
    - GDPR and data security descriptions
    - governmental actors (National Cyber Security Centre, Police)

    Personal cyber security
    - media literacy, reliability of information
    - risk management
    - access control and password
    - Cryptology (check sum function, asymmetric and symmetric encryption)
    - Malware, threats and vulnerabilities
    - Encryption of data transfer
    - Hardening of personal devices
    - Classification of one's own information (private, public)

    Organizational cyber security
    - How does the aforementioned affect the overall security of public and private organizations
    Assessment criteria
    Assessment criteria - grade 1 and 2
    Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

    Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
    Assessment criteria - grade 3 and 4
    Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

    Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
    Assessment criteria - grade 5
    Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

    Language of instruction

    Finnish

    Lecturer(s)

    Jarmo Viinikanoja

    Campus

    Lutakko Campus

    Timing

    01.12.2022 - 31.01.2023

    Groups
    • ZJA22STIDI
    Degree Programme

    Bachelor's Degree Programme in Information and Communications Technology

    Mode of delivery

    Online learning

    Share of virtual studies

    4 cr

    Credits
    • 4 cr
    Unit

    School of Technology