ICT Security Basics from Trust to Blockchain ICT4HM103-3003 28.03.2022-20.05.2022 5 (MAICTE, ...)+-
Starting level and linkage with other courses
No prerequisites.
Contents
- The basic concepts of data security. CIA (confidentiality, integrity, availability). Confrontation. The attacker's perspective and pentest. What does ICT security involve? The most effective, common and successful techniques for attacking businesses.
- Low hanging fruit, defender’s perspective. Basic ICT security tools. ICT security with ulterior tools. Possible additional issues: easy attacks in practice.
- Encryption. Importance of CIA. How to decrypt encryption? When does encryption need not be broken? Symmetric and asymmetric encryption. Seals. Two-sided authentication. Traffic measurement intelligence.
- Practical encryption techniques. Email encryption with PGP. Public Key Infrastructure. Decentralised and centralised trust. TLS CA vs. PGP PKI trust.
- Modern encryption techniques. Anonymous networks, TOR. Virtual private networks and their substitutes. Encrypted, decentralised distributed file sharing within an organisation.
- Block chains
- Cryptocurrency
Assessment criteria
Assessment criteria - grade 1
The student knows the concepts of information security at a basic level, can use the required tools individually by following instructions in a book, has returned homework, but failed to complete all tasks due to recurring situations, which have prevented the continuation of study.
Assessment criteria - grade 3
The student is familiar with the basic concepts of information security and is able to explain in a general way, for example, how they can be used as tools; can use the tools in normal situations and is able to identify examples of how to apply security principles to everyday personal and business life.
Assessment criteria - grade 5
The student understands the basic concepts of information security and the tools to be used in that relationship; identifies examples of the use of basic concepts – also within new situations; is able to solve simple problem situations and use new features that have been added to familiar tools; can identify threats to security and is able to put them in context and is able to initiate the improvement of personal and business security by applying principles found in to day-to-day data knowledge security.
Further information
When the implementation type of the course is contact, online or blended it is required that the student is present during those teaching hours that are marked in the study schedule. If you are absent more than 25%, your grade will be lowered by one. If you are absent more than 50%, the course is failed.