Skip to main content

Before choosing course

Part 1

AimPresent system theories such that the students can understand how to approach IT related security holistically
Having completed this course the student will be able to
1. Define and describe vital concepts of general and particularized system theories and approaches, used as epistemology for the /ICT/security area
2. Explain and exemplify control principles according to various laws and models for steering and control
3. Analyze security and risk according to various laws and models for steering and control.
4. Communicate and analyze threat, risk and security as systemic phenomena and vice versa
5. Identify and report on a /ICT/ security problem, its reason or origin and suggested solutions as reported in /scientific/ journals
6. As a group member report and present in scientific manners, written descriptions and analyses of some current security phenomenon or problem including relating the phenomenon/problem to system theories.
7. Orally present and defend own and debate other groups’ presentations
SyllabusCyernetics and control systems
Generell Systems Theory
Living Systems Theory
Threat - Risk - Protection
* Introduction to the vulnerable society
* Introduction to system theories
* The ICT infrastructure: distributed platforms and distributed computing
* The use of ICT in the society: in the public administration, in the industry, in service provision, in logistics and the supply of energy, water and food
* Scenarios of attacks on national, organisational and personal levels
OutlineLectures and seminars in English.
The course consists of the following themes:
• Holistic views on security and safety
• Security and control versus risk
• Information Security or Data Security?
• Environments for InfoSec
• Safety and security in the Systems perspective
• Example of system theories as control methods
• Can theory and practice unite?Part 2AimHaving completed this course the student will be able to
a) communicate knowledge of the concepts, models and terms commonly used in the area of ICT security.
b) identify and productively experiment with currently relevant ICT security issues.
c) evaluate factors that influence the security of systems.
SyllabusThe course includes:
* Introduction to information security
* Security Models and Policies
* Cryptography overview
* Security Architectures, incl. Identification, authentication, access control.
* Malicious Software, incl. Viruses, worms, trojan horses, etc.
* Program Security
* Security Tools
* Assurance
* Law and ethics
* Privacy and Privacy Enhancement Tools

Course offering missing for current semester as well as for previous and coming semesters

Content and learning outcomes

Course contents

No information inserted

Intended learning outcomes

No information inserted

Course Disposition

No information inserted

Literature and preparations

Specific prerequisites

No information inserted

Recommended prerequisites

No information inserted


No information inserted

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale

A, B, C, D, E, FX, F


No information inserted

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted


Profile picture Louise Yngström

Further information

Course web

No information inserted

Offered by

ICT/Systems Science (SU)

Main field of study

No information inserted

Education cycle

Second cycle

Add-on studies

No information inserted


Yngström, Louise