DE

Modul

Information Security [M-WIWI-104069]

Credits
9
Recurrence
Jedes Semester
Duration
2 Semester
Language
German
Level
3
Version
3

Responsible

Organisation

  • KIT-Fakultät für Wirtschaftswissenschaften

Part of

Bricks

Identifier Name LP
T-WIWI-109786 Advanced Lab Security 4.5
T-WIWI-108439 Advanced Lab Security, Usability and Society 4.5
T-WIWI-110342 Applied Informatics – Information Security 4.5

Competence Certificate

The module examination is carried out in the form of partial examinations on the selected courses of the module, with which the minimum requirement at creditpoints is fulfilled. The learning control is described in each course. The overall score of the module is made up of the sub-scores weighted with creditpoints and is cut off after the first comma point.

Competence Goal

The student

  • can explain and apply the basics of information security
  • knows appropriate measures to achieve different protection goals and can implement these measures
  • can assess the quality of organisational protective measures, i. e. among other things knows what has to be taken into account when using the individual measures
  • Understanding the differences between information security in the enterprise and in the private context
  • knows the areas of application of a variety of relevant standards and knows their weaknesses
  • knows and can explain the problems of information security which may arise from human-machine interaction
  • can assess messages about detected security problems in a critical way
  • can structure a software project in the field of information security and explain and present results in oral and written form
  • can use the techniques of Human Centred Security and Privacy by Design to create user-friendly software.

Prerequisites

None

Content

  • Basics and concepts of information security
  • Understanding the protection objectives of information security and various attack models (including associated assumptions)
  • introduction of measures to achieve the respective protection goals, taking into account different attack models
  • Note: In contrast to the IT Security lecture, measures such as encryption algorithms are treated only abstractly, i. e. the idea of the measure, assumptions to the attacker and the deployment environment.
  • Presentation and analysis of problems of information security arising from human-machine interaction and presentation of the Human Centered Security by Design approach.
  • Introduction into organisational protective measures and standards to be observed for companies.

Workload

The total workload for this module is approximately 270 hours.