Diese Seite auf DE
Modul
Information Security [M-WIWI-104069]
Credits
9Recurrence
Jedes SemesterDuration
2 SemesterLanguage
GermanLevel
3Version
3Organisation
- KIT-Fakultät für Wirtschaftswissenschaften
Bricks
Identifier | Name | LP |
---|---|---|
T-WIWI-109786 | Advanced Lab Security | 4.5 |
T-WIWI-108439 | Advanced Lab Security, Usability and Society | 4.5 |
T-WIWI-110342 | Applied Informatics – Information Security | 4.5 |
Competence Certificate
The module examination is carried out in the form of partial examinations on the selected courses of the module, with which the minimum requirement at creditpoints is fulfilled. The learning control is described in each course. The overall score of the module is made up of the sub-scores weighted with creditpoints and is cut off after the first comma point.
Competence Goal
The student
- can explain and apply the basics of information security
- knows appropriate measures to achieve different protection goals and can implement these measures
- can assess the quality of organisational protective measures, i. e. among other things knows what has to be taken into account when using the individual measures
- Understanding the differences between information security in the enterprise and in the private context
- knows the areas of application of a variety of relevant standards and knows their weaknesses
- knows and can explain the problems of information security which may arise from human-machine interaction
- can assess messages about detected security problems in a critical way
- can structure a software project in the field of information security and explain and present results in oral and written form
- can use the techniques of Human Centred Security and Privacy by Design to create user-friendly software.
Prerequisites
None
Content
- Basics and concepts of information security
- Understanding the protection objectives of information security and various attack models (including associated assumptions)
- introduction of measures to achieve the respective protection goals, taking into account different attack models
- Note: In contrast to the IT Security lecture, measures such as encryption algorithms are treated only abstractly, i. e. the idea of the measure, assumptions to the attacker and the deployment environment.
- Presentation and analysis of problems of information security arising from human-machine interaction and presentation of the Human Centered Security by Design approach.
- Introduction into organisational protective measures and standards to be observed for companies.
Workload
The total workload for this module is approximately 270 hours.