Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
New Master’s Students at the Department of Informatics
Information Security
Lectures
Cybersecurity at IFI
2
Hardware Enabled Security
Network Forensics & Ethical Hacking
Biometrics
Cryptography
Identity & Access Management
Privacy and Data Protection
Audun
NilsLaszlo
Post Doc
Magdalena
Fabio
Machine Learning
PhDKamer
Ijlal
Vasileios Siri
... + Borger, Åvald, Jon-Martin
Cloud & Mobile Sec.
Lillian
Tamas
⚫ Example with long Master's thesis of 60 ECTS credits:
⚫ Example with short Master's thesis of 30 ECTS credits:
Program structure
3
4. semester Master's thesis Master's thesis Master's thesis
3. semester Master's course Master's course Master's course
2. semester Master's course Master's course Master's course
1. semester Master's course Master's course Master's course
10 ECTS credits 10 ECTS credits 10 ECTS credits
4. semester Master's thesis Master's thesis Master's thesis
3. semester Master's thesis Master's thesis Master's course
2. semester Master's thesis Master's course Master's course
1. semester Master's course Master's course Master's course
10 ECTS credits 10 ECTS credits 10 ECTS credits
Recommended Courses
⚫ 1. Semester:− IN5290 – Ethical Hacking− IN5540 – Privacy by Design− TEK5510 – Security in operating systems and software− TEK4500 – Introduction to Cryptography− IN5130 – Unassailable IT-systems
⚫ 2. Semester:− IN5420 – Distributed Blockchain Technologies− TEK5550 – Advanced Topics in Cryptography− IN5430 – IT and Management
⚫ 3. Semester:− IN5280 – Security by Design− INxxxx – Network Security− (see first semester)
⚫ See also:− https://www.uio.no/english/studies/programmes/informatics-programming-master/programme-
options/information-security/structure/
4
… or any other relevant courses of interest
No mandatory courses!
IN5290 – Ethical Hacking
⚫ Theoretical basis for security testing
⚫ Protect systems against modern cyber attacks
⚫ Legal aspects of performing ethical hacking
⚫ Practical penetration testing using up-to-date tools and techniques
⚫ Evaluation of the security status of systems
⚫ Finding solutions for removing security vulnerabilities
⚫ Verifying the status of vulnerabilities and for applying patches
5
Security Lab & Ethical Hacking Team
6
IN5540 – Privacy by Design
⚫ Basic legal privacy concepts and data protection regulations
⚫ Security and privacy enhancing technologies
⚫ Concepts of privacy by design and privacy impact assessment
⚫ Principles of architectural tactics for privacy and privacy patterns
7
TEK5510 – Security in operating systems and software
⚫ Security policies and mechanisms in operating systems
⚫ Understanding of vulnerabilities in operating system and software
⚫ Insight into methods for development and test of security in software
8
TEK4500 – Introduction to Cryptography
⚫ Classical systems, information theory, mathematical background
⚫ Symmetrical crypto systems, block ciphers, stream ciphers, DES, Advanced Encryption Algorithm (AES)
⚫ Hash functions and message authenticaion (MAC)
⚫ Asymmetric cryptosystems, RSA and El Gamal, digital signatures, elliptic curves
⚫ Provable security
9
IN5280 – Security by Design
⚫ GDPR (General Data Protection Regulation) + Frameworks
⚫ Security requirements in system specifications, design, and testing
⚫ Threat modelling and security/privacy risk assessment of system functionality and components
⚫ Application of the principles of privacy by design and security by design during practical systems development
⚫ Assessment of the maturity of secure systems development
10
INxxxx – Network Security
⚫ Security Foundations
⚫ Cryptography
⚫ Certificates and PKI
⚫ Transport Security
⚫ Network Authentication
⚫ Wireless LAN Security
⚫ Network Perimeter Security
⚫ Web Security
11
Master Project Topics
⚫ https://www.mn.uio.no/ifi/studier/masteroppgaver/cybersecurity/
⚫ … or contact us directlyfor other topics/own ideas (also in collaboration with industry)
12
Partnership for Cybersecurity
⚫ RCN funded collaboration between academic and research institutions in Norway, Germany and France in the field of cybersecurity
13
Contact
⚫ Ole-Johan Dahls hus, section D, 9th floor
⚫ Audun Jøsang, [email protected]
⚫ Nils Gruschka, [email protected]
⚫ Laszlo Erdödi, [email protected]
14
AudunNils
Laszlo