|Structure Type: ||Course|
|Credits: ||3.0 points|
|Responsible Teacher: ||Anttonen, Alpo|
|Language of Instruction: ||Finnish|
Course Implementations, Planned Year of Study and Semester
|Curriculum  ||Semester  ||Credits  ||Start of Semester  ||End of Semester|
Student knows the threats that are directed to the computer networks and knows the methods how to protect against these threats.
Total work load of the course: 80 h
- of which scheduled studies: 40 h
- of which autonomous studies: 40 h
The course involves discussion of logical security methods, such as user identification, data encryption, surveillance, security protocol, and data security of open systems.
Recommended or Required Reading
- Lecture notes
Mode of Delivery / Planned Learning Activities and Teaching Methods
Lectures and practical exercises in the laboratory
5 Students are able to commendable rate issues and know how to apply them.
4 -3 Students are able to rate the key issues
2- 1 Students are able to rate the basics.
Exam and assignment