Language of instruction : English |
Sequentiality
|
|
No sequentiality
|
| Degree programme | | Study hours | Credits | P1 SBU | P1 SP | 2nd Chance Exam1 | Tolerance2 | Final grade3 | |
 | Master of Software Systems Engineering Technology | Compulsory | 135 | 5,0 | 135 | 5,0 | Yes | Yes | Numerical |  |
|
| Learning outcomes |
- EC
| EC1 – The Master of Software Engineering Technology can communicate adequately, cooperate effectively, and take into account the economic, ethical, social and/or international context and (s)he is aware of the impact on the environment in all aspects of his/her professional thought-process and agency. (S)he displays an appropriate engineering attitude, including continuous attention to the development of his/her professional competencies --. [people, data literacy and essential software skills]. | | - DC
| DC-M9 - can communicate in oral and in written (also graphical) form. | | - DC
| DC-M12 - shows a suitable engineering attitude. | - EC
| EC2 - The Master of Software Engineering Technology masters the necessary sets of knowledge and skills regarding the design of integrated, resilient software systems and can creatively conceive, plan and implement them as an integrated part of a series of methodologically ordered actions within multidisciplinary projects with a significant research and/or innovation component. [systems thinking] | | - DC
| DC-M2 - has insight in the basic concepts and methods. | | - DC
| DC-M3 - can recognize problems, plan activities and perform accordingly. | | - DC
| DC-M4 - can gather, measure or obtain information and refer to it correctly. | | - DC
| DC-M5 - can analyze problems, logically structure and interpret them. | | - DC
| DC-M6 - can select methods and make calculated choices to solve problems or design solutions. | | - DC
| DC-M8 - can evaluate knowledge and skills critically to adjust own reasoning and course of action accordingly.
| - EC
| EC3 - The Master of Software Engineering Technology has advanced knowledge and understanding of the principles and applications of software engineering, including software development processes, software architectures and the software life cycle, and can apply them, with an understanding of current technological developments, in complex and practice-oriented problem domains. [software engineering] | | - DC
| DC-M7 - can use selected methods and tools to implement solutions and designs. | - EC
| EC4 - The Master of Software Engineering Technology has advanced knowledge and understanding of principles and applications of contemporary wireless and mobile communication networks, and in this domain, (s)he can autonomously initiate, plan, critically analyse and solve problems in a well-founded manner with an eye for data acquisition and implementation, and with the help of simulation techniques or advanced tools. [connected] | | - DC
| DC-M1 - has knowledge of the basic concepts, structures and coherence.
| | - DC
| DC-M5 - can analyze problems, logically structure and interpret them. | - EC
| EC5 - The Master of Software Engineering Technology masters the necessary sets of specialised knowledge and skills for the design of modular, integrated software systems that, on the basis of data acquisition and data analysis, can make intelligent decisions and that are resilient (secure, robust and scalable), within multidisciplinary projects with an applied research and/or innovation component. [intelligent & resilient systems] | | - DC
| DC-M1 - has knowledge of the basic concepts, structures and coherence.
| | - DC
| DC-M2 - has insight in the basic concepts and methods.
| | - DC
| DC-M3 - can recognize problems, plan activities and perform accordingly. | | - DC
| DC-M4 - can gather, measure or obtain information and refer to it correctly.
| | - DC
| DC-M5 - can analyze problems, logically structure and interpret them.
| | - DC
| DC-M6 - can select methods and make calculated choices to solve problems or design solutions.
| | - DC
| DC-M7 - can use selected methods and tools to implement solutions and designs.
| | - DC
| DC-M8 - can evaluate knowledge and skills critically to adjust own reasoning and course of action accordingly.
| - EC
| EC6 - The Master of Software Engineering Technology masters the necessary sets of specialised knowledge and skills regarding generic abstraction techniques such as virtualization and containerization in order to utilise the underlying hardware and software systems in a secure, protected, and efficient way. [virtual world] | | - DC
| DC-M8 - can evaluate knowledge and skills critically to adjust own reasoning and course of action accordingly.
|
|
| EC = learning outcomes DC = partial outcomes BC = evaluation criteria |
|
Abstract: This course will provide an in-depth discussion of the resiliency and security practices employed in industry and academia. The topics will enable the students to understand the fundamentals along with the limitations of cyber security. An introduction to cyber security ideas, trends, and the current state of affairs. We examine the issue from the standpoints of attackers, defenders, and societies.
Objective: From a technological, economic, legal (GDPR), and social perspective, students will explore the advancements, principles, issues, limitations, and key state-of-the-art practices in cyber security. Completion of the course will enable students to implement the best resiliency and security practices in interdisciplinary domains.
Contents:
- Introduction
- Resiliency, security principles
- Brief history of the rise of the Internet from the attackers, defenders, commercial and societal perspective
- Internet Infrastructures
- OSI model
- TCP/IP
- ICN/NDN
- SCION
- Cybersecurity principles (Risk)
- Core security assets such as confidentiality, integrity, availability, authenticity, accountability, non-repudiation, privacy
- Dominant players, protocols, and technologiesAttacker capabilities (Adversary Models, different attacks)
- Attacker capabilities and the offensive use from a technical, economic, organizational, and operational perspectives
- Understand common and novel attack and evasion techniques, the proliferation of expertise and tools, optimal timing to use zero-day attacks
- Attack types (IoT attacks)detection evasion techniques (Roving malware)
- Botnets, exploit markets, plausible deniability, distributed denial of service (DDoS), famous cyber attacks Stuxnet, smartTV hack, jeephack, recent attacks, PEGASUS
- Resiliency
- Software vulnerabilities (different attacks)
- Missing data encryption, OS command injection., SQL injection, Buffer overflow, Missing authentication for critical functions, Missing authorization, and Unrestricted upload of dangerous file types.
- Reliance on untrusted inputs in a security decision, hardcoded credentials
- Multifactor authentication, SSO, Physical access keys
- Resiliency by design
- Secure system design
- OWASP design principles
- STRIDE and LINDDUN threat analysis
- Attack tree analysis (Brief overview)
- Resiliency
- Resiliency by design
- Tradeoffs (money, resource)
- Self-healing framework
- Cyber security options and limitations
- Increasing software complexity and vulnerabilities, the illusion of secure software
- Full disclosure debate, the economics of bug bounty programs
- Internet of things, Industry control systems (SCADA/ICS)
- Security and integrity of the supply chain (IoT, Smart-X, Blockchain applications)
- Cryptocurrencies
- Legal Aspects and best practices
- GDPR
- Social media and mass protests
- Erosion of privacy (Different laws)
- End to the end-to-end encryption (Indian, Belgian laws to prohibit the use of Signal like apps)
|
|
|
Period 1 Credits 5,00
Evaluation method | |
|
Written evaluaton during teaching periode | 55 % |
|
Transfer of partial marks within the academic year | ✔ |
|
Conditions transfer of partial marks within the academic year | 12/20 |
|
|
|
|
|
|
|
|
|
|
Written exam | 45 % |
|
Transfer of partial marks within the academic year | ✔ |
|
Conditions transfer of partial marks within the academic year | 10/20 |
|
|
|
|
|
|
Multiple-choice questions | ✔ |
|
|
|
|
|
|
Evaluation conditions (participation and/or pass) | ✔ |
|
Conditions | Students need to have at least 8/20 on either the evaluation during the academic year and the exam. |
|
|
|
Consequences | The total for the course will be at most 9/20. |
|
|
|
Second examination period
Evaluation second examination opportunity different from first examination opprt | |
|
|
 
|
Recommended course material |
|
Most of the material will be assembled from the following sources:
|
|
|
|
|
|
1 examination regulations art.1.3, section 4. |
2 examination regulations art.4.7, section 2. |
3 examination regulations art.2.2, section 3.
|
Legend |
SBU : course load | SP : ECTS | N : Dutch | E : English |
|