•   ICT Security Basics from Trust to Blockchain ICT4HM103-3006 21.10.2024-13.12.2024  5   (MAICTE, ...) +-
    Starting level and linkage with other courses
    No prerequisites.
    Contents
    - The basic concepts of data security. CIA (confidentiality, integrity, availability). Confrontation. The attacker's perspective and pentest. What does ICT security involve? The most effective, common and successful techniques for attacking businesses.
    - Low hanging fruit, defender’s perspective. Basic ICT security tools. ICT security with ulterior tools. Possible additional issues: easy attacks in practice.
    - Encryption. Importance of CIA. How to decrypt encryption? When does encryption need not be broken? Symmetric and asymmetric encryption. Seals. Two-sided authentication. Traffic measurement intelligence.
    - Practical encryption techniques. Email encryption with PGP. Public Key Infrastructure. Decentralised and centralised trust. TLS CA vs. PGP PKI trust.
    - Modern encryption techniques. Anonymous networks, TOR. Virtual private networks and their substitutes. Encrypted, decentralised distributed file sharing within an organisation.
    - Block chains
    - Cryptocurrency
    Assessment criteria
    Assessment criteria - grade 1
    The student knows the concepts of information security at a basic level, can use the required tools individually by following instructions in a book, has returned homework, but failed to complete all tasks due to recurring situations, which have prevented the continuation of study.
    Assessment criteria - grade 3
    The student is familiar with the basic concepts of information security and is able to explain in a general way, for example, how they can be used as tools; can use the tools in normal situations and is able to identify examples of how to apply security principles to everyday personal and business life.
    Assessment criteria - grade 5
    The student understands the basic concepts of information security and the tools to be used in that relationship; identifies examples of the use of basic concepts – also within new situations; is able to solve simple problem situations and use new features that have been added to familiar tools; can identify threats to security and is able to put them in context and is able to initiate the improvement of personal and business security by applying principles found in to day-to-day data knowledge security.
    Further information
    When the implementation type of the course is contact, online or blended it is required that the student is present during those teaching hours that are marked in the study schedule. If you are absent more than 25%, your grade will be lowered by one. If you are absent more than 50%, the course is failed.

    No replacements.

    Teaching methods and instruction

    Learn security fundamentals to understand current trends. Blockchains, TOR network and video conference encryption all stand on these fundamentals.

    - Weekly online video conference classes. Includes discussions and student presentations.
    - Homework reported weekly. Reading tasks for theory and learning to follow cybersecurity. Hands-on tasks to connect theory to real life.
    - Your own presentation to classmates.

    Has reached excellent 4.9 out of 5 feedback.

    Check out previous course instance agenda, homework and student feedback https://terokarvinen.com/2023/trust-to-blockchain/

    Responsible person

    Kari Hiekkanen

    Learning material and recommended literature

    Material identified by the teacher during the course. Usually includes white papers, book chapters, tutorials, manuals and hacker conference presentations. Different types of material help you to get familiar with key sources of cyber security information. Most material is available using subsciptions paid by Haaga-Helia (free for students) or free, publicly available sources.

    Working life connections

    Classes are interactive, and you can hear your classmates work experiences and bring your own insight.

    Campus

    Pasila Campus

    Exam dates and re-exam possibilities

    No exam.

    Teaching language

    English

    Internationality

    Mixed group with both Finnish and international students.

    Timing

    21.10.2024 - 13.12.2024

    Learning assignments

    - Weekly classes, online video conference - active participation required at class time - Weekly homework (theory + hands on) - Presentation Classes are interactive, encouraging student discussions and presentations. For each week, there is homework with written report. Homeworks have both reading and hands-on computer tasks. Some computer skills required. We'll use actual hacker tools and techniques, but mostly to understand and practice theory. Required tasks in this course require only regular computer knowledge. (This course does not have prerequisisite coding or hacking skills. I am teaching a different set of courses for those needing technical hacking and penetration testing skills: Tunkeutumistestaus ici001as3a, Sovellusten hakkerointi ja haavoittuvuudet ici012as3a-3001)

    Enrollment

    03.06.2024 - 18.10.2024

    Content scheduling

    Online participation required. This course is based on class discussions and interactivity. You are expected to participate in online video conference during the class times each week.

    Agenda will keep updating during the course. Initial agenda:

    1. Welcome words. Overview of the course.
    2. Fundamentals. Threat model.
    3. Treath modeling. Current crime case example.
    4. Hashes, passwords and cracking them.
    5. Public key encryption and signing.
    6. Bitcoin.
    7. Modern applications (e.g. Darknet, Altcoins...).
    8. Presentations.

    Groups
    • MAICTE
    • MAICTF
    • EVENING
    • EXCH
    • ONLINE
    Alternative learning methods

    Online video conference, active participation required at class time. Homework reported every week.

    Teachers

    Tero Karvinen

    Seats

    15 - 30

    Further information

    Homework 50% and presentation 50%. Evaluation is based on totality of the skills and knowledge demonstrated.

    Online classes require active participation. No tapes are provided.

    Degree Programme

    BUTEM Degree Programme in Business Technologies, LITEM Degree Programme in Business Technologies

    R&D proportion

    0.00 cr

    Virtual proportion

    1.00 cr

    Evaluation scale

    H-5