TKK | Networking Laboratory | Studies | S-38.3153
Course moved to Noppa
Information security is a large, multi-disciplined area of art and science. It ranges from mathematical methods of cryptology to strength of materials; from nanoscale details of semiconductors to psychology; from legal code to economy.
In a four credit course it is impossible to cover even a small part of this all. The course is a introductory course that will cover basic consepts. After the basics have been introduced, the course will focus on network perspective of security. What is the security when observerd from the network and what can be done in network to improve security.
The course is designed as much as possible on less is more principle so that the course is not breathtaking collection of nice-to-know details, legacy information, techincal details and terminology but provides solid base on that networking expert can build ones competence. For example, cryptology is not covered on this course excluding basic concepts needed to understand other concpets. Physical security is only slightly touched on regulatory requirements.
There exists several network and security related courses in TKK. The following list states some of those and gives a short description how this course (S-38.3153) and the other course relate to each one.
Lectures will be held in hall S4 on Tuesdays from 8-12. The first lecture is at 18th March 2008. Lectures will be held in Finnish but all course material is available in English. There will be 12 lectures. Lecture topics are still subject to change, but time schedule is available.
The course is not strictly based on any specific book. There are several books that cover basics of computer and networking security. These books include (in order of lecturer's preference):
Lecture slides will provide lecturer's view to course material, updates and course focus on this very broad area. Slides will be provided as paper copies by Edita Prima Opetusmonisteet. The slides are available also on course web pages in PDF format by at latest Monday afternoon before lecture. Note that you are not allowed to print lecture slides using TKK printers, you must use your own if you want to print those. The material will be partly updated and reorganised from the previous years.
Additional resources will be provided as paper copies by Opetusmonisteet. This material will be provided also as links from course pages (some material might be available only from TKK computers -- hut.fi / tkk.fi domain).
It is prohibited to print any course material using TKK printers. Use your own printer, if you print. One set (and only one) of material will be provided for self-service copying by course bulletin board in G2 wing. If this set disappears, no another set will be provided. So borrow it only for time needed for copying.
To complete the course, one needs to take the exam (first one 8th May at 13-16 hall S1).
One can look for earlier exams to find out what kind of questions are asked earlier. One should note that each year some new material is introduced and may be asked in exam. As recommended books have a bit different focus compared to one of course, one can use lecture slides to find focus areas. Just reading lecture slides instead does not provide sufficient background that is needed.
Following is a list of chapters in Ross Anderson: Security Engineering — A Guide to Building Dependable Distributed Systems that are relevant in this course. On some topic areas the book goes much more deep in details than required.
Lectures are given by TkL Markus Peuhkuri.