Skip to main content
Till KTH:s startsida Till KTH:s startsida

DD2510 Cybersecurity in a Socio-Technical Context 7.5 credits

This course aims to provide an introduction to and overview of how technical and non-technical aspects of cybersecurity interact.

Choose semester and course offering

Choose semester and course offering to see current information and more about the course, such as course syllabus, study period, and application information.

Application

For course offering

Autumn 2024 cybsoc24 programme students

Application code

50535

Headings with content from the Course syllabus DD2510 (Autumn 2022–) are denoted with an asterisk ( )

Content and learning outcomes

Course contents

This course intends to give an introduction and overview of how technical and non-technical aspects of cybersecurity influence one another. The course concerns the actors that influence, how cybersecurity is designed in digital systems. Human use of digital systems can in many ways be considered as a part of the system itself and has a clear impact on the security of the system. People and their actions form both the basis for the threats to which digital systems are exposed, and how we choose to defend these systems. This action is also influenced by the laws of the society.

The course consists of four separate modules that cover these different actors and their relation to cybersecurity :

  1. legal aspects
  2. threat actors
  3. processes and organisation
  4. vulnerabilities in the use of systems

Intended learning outcomes

After passing the course, the student shall be able to

  • describe fundamental legislation in the cybersecurity area and in a broad stroke describe how this legislation should be interpreted in different scenarios
  • describe different types of threat actors and the threats that they direct against different types of digital systems
  • describe and analyse commonly occurring work processes for development and administration of secure digital systems and relate this to diversity, gender equality, equal rights and ethical aspects
  • describe and analyse how individuals and organisations constitute attack surfaces and potential security vulnerabilities in digital systems and relate this to diversity, gender equality, equal rights and ethical aspects

in order to

  • understand and be able to convey the importance of cybersecurity in society
  • create and be able to maintain a good understanding of how the properties of threat actors influence how secure digital systems should be created
  • understand and be able to identify the balance between technical and non-technical properties to create secure digital systems
  • facilitate action within the boundaries of the law.

Literature and preparations

Specific prerequisites

Knowledge in computer security, 6 higher education credits, equivalent to completed course DD2391/DD2395.

Active participation in a course offering where the final examination is not yet reported in LADOK is considered equivalent to completion of the course.

Being registered for a course counts as active participation.

The term 'final examination' encompasses both the regular examination and the first re-examination.

Recommended prerequisites

No information inserted

Equipment

No information inserted

Literature

No information inserted

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale

A, B, C, D, E, FX, F

Examination

  • UPP1 - Oral and written assignments, 2.0 credits, grading scale: A, B, C, D, E, FX, F
  • UPP2 - Oral and written assignments, 2.0 credits, grading scale: A, B, C, D, E, FX, F
  • UPP3 - Oral and written assignments, 2.0 credits, grading scale: A, B, C, D, E, FX, F
  • UPP4 - Oral and written assignments, 1.5 credits, grading scale: A, B, C, D, E, FX, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

Other requirements for final grade

Active participation in all compulsory activities.

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted

Examiner

Ethical approach

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

Course room in Canvas

Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.

Offered by

Main field of study

Computer Science and Engineering

Education cycle

Second cycle

Add-on studies

No information inserted

Supplementary information

In this course, the EECS code of honor applies, see:
http://www.kth.se/en/eecs/utbildning/hederskodex