Course development and history
Last planned examination: Spring 2000
Decision to discontinue this course: No information inserted
• Corporate and IT governance• Operative risk• Risk tolerance and risk appetite• Risk analysis and vulnerability assessment• Security standards and framework• Cost/benefit analysis• Acceptance Criteria• Education, motivation, ethical considerations and awareness
When the student has actively participated in the course, the student should be able to:
1. choose and argument for relevant solutions based on specific security requirements
2. analyze and critically review given suggestions for various security solutions
3. based on his/her own assessment integrate different solutions for complex security requirements
4. within a group assignment apply and develop security requirements solutions for international organizations, based on a concrete business case
Lectures (approx. 20 hours)Seminars, attendance compulsory (approx. 15 hours)
No information inserted
IV1013 Introduktion till datasäkerhet/Introduction to Computer Security
OECD Guidelines "Towards a Culture of Security" "Criminology in A NutShell" BolognaThe Manual is the Message"A day in the life of an IT security Officer"
A, B, C, D, E, FX, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability. The examiner may apply another examination format when re-examining individual students.
Project assignment, 50%.Written exam, 50%.
The student needs to pass both the project assignment and the written exam. The final course grade is based on the grade of the written exam.
Further information about the course can be found on the Course web at the link below. Information on the Course web will later be moved to this site.
ICT/Systems Science (SU)
Stewart Kowalski (email@example.com)
The course includes parts from the course IV2000 "Security Management", 7,5 hp, so the two courses should therefore not be taken together.