Course syllabus

Informatics, Introduction to Information Security, Second Cycle, 7.5 credits

Course code: IK431A Credits: 7.5
Main field of study: Informatics Progression: A1N
Last revised: 12/03/2024    
Education cycle: Second cycle Approved by: Head of school
Established: 01/11/2019 Reading list approved: 12/03/2024
Valid from: Autumn semester 2024 Revision: 2

Learning outcomes

1. Through surrounding world analysis understand the importance of information security in an increasingly digitilized world.
2. Based on practical guidelines be able to define and use key concepts within information security.
3. Based on relevant research understand how key concepts can be defined and used differently.
4. Based on relevant research understand different perspectives on information security.
5. Be able to describe national and international structures and processes for information security based on a case analysis.
6. Have the ability to critically evaluate other students' written work based on given criteria.

Content

The course will be organized around five modules:
1. Introduction to the information security master program. During this module we present the structure of the program, the background and the pedagogical methods used. We also discuss professional roles that are focused during the program.
2. Motives for working with information security. During this module we introduce the field of information security - history, why it is important and standardization bodies. All issues will be discussed from an international-, national-, organizational- and individual level. The students also attend seminars where they analyze and discuss real security incidents, the importance of the field, existing threats and so on. (Addressing goal 1)
3. The most important concepts, models and perspectives. During this module the students read provided course literature, and watch recorded lectures. The students also attend seminars where they discuss important concepts, models and perspectives. The key concepts introduced during the course are for example: confidentiality, integrity, availability, threat, risk, incident, information assets, and security measures. (Addressing goals 2, 3 and 4)
4. Structures and processes for information security (international and national organizations, management systems, standards). During this module the students search for information about one information security organization and present it to the other groups. During the seminar the students will build a framework showing relationships between all the organizations previously presented (Addressing goal 5).
5. Criteria for critical evaluation of written report. During this module the students read the provided course literature and use recorded lectures. The students also attend seminars where they discuss criteria for critical evaluation of a written report. The students then use these critera in order to evaluate a written report. (Addressing goal 6)

Examinations and grades

Oral Group Examination, 1 credits (Code: A001)
Grades used are Fail (U) or Pass (G).

Oral Group Assignment, 1 credits (Code: A002)
Grades used are Fail (U) or Pass (G).

Oral and Written Group Assignment, 2.5 credits (Code: A003)
Grades used are Fail (U) or Pass (G).

Individual Written Assignment, 3 credits (Code: A004)
Grades used are Fail (F), Sufficient (E), Satisfactory (D), Good (C), Very Good (B) or Excellent (A).


According to the Higher Education Ordinance, Chapter 6, Section 18, a grade is to be awarded on the completion of a course, unless otherwise prescribed by the university. The university may determine which grading system is to be used. The grade must be determined by a teacher specifically nominated by the university (the examiner).

In accordance with university regulations on grading systems for first and second-cycle courses and study programmes (Vice-Chancellor’s decision ORU 2018/00929), one of the following grades is to be used: fail (U), pass (G) or pass with distinction (VG). For courses included in an international master’s programme (60 or 120 credits) or offered to the university’s incoming exchange students, the A to F grading scale is to be used. The vice-chancellor, or a person appointed by them, may decide on exceptions from this provision for a specific course, if there are special grounds for doing so.

The grades used on this course are Fail (F), Sufficient (E), Satisfactory (D), Good (C), Very Good (B) or Excellent (A).

Comments on grades

For an approved final grade on the course, an approved result is required for all examinations. The letter grades A-E are weighted into a final grade based on the examinations of the entire course.

Modes of assessment

Oral Group Examination, 1 credits (Code: A001)
Literature-seminar on different perspectives on information security. (Assesses goal 3 and 4)

Oral Group Assignment, 1 credits (Code: A002)
Workshop on structures and processes for information security. During the seminar the students present information about one information security organization to the other groups. During the seminar the students build a framework showing relationships between all the organizations previously presented. (Assesses goal 5).

Oral and Written Group Assignment, 2.5 credits (Code: A003)
Analysis of a current, real life information security incident. Seminar where the students, with help of key concepts, have to analyze a current, real life information security incident. (Assesses goals 1 and 2).

Individual Written Assignment, 3 credits (Code: A004)
The students have to assess another groups' written assignment (part 0110) based on given criteria. (Assesses goals 1, 2 and 6)

For students with a documented disability, the university may approve applications for adapted or other modes of assessment.

For further information, see the university's local examination regulations.

Specific entry requirements

Informatics, Basic Course 30 Credits, 30 Credits at intermediate course level within Informatics and successful completion of at least 15 Credits at advanced course level within Informatics. Alternatively Business Administration, Basic Course, 30 Credits, Business Administration, Intermediate Course, 30 Credits and successful completion of at least 15 Credits at advanced course level within Business Administration. Alternatively 30 Credits within G1N in Computer Science and 45 Credits within G1F in Computer Science. The applicant must also have qualifications corresponding to the course "English B" or "English 6" from the Swedish Upper Secondary School.

For further information, see the university's admission regulations.

Other provisions

The course is offered in English and therefore all examinations will be conducted in English.

Students who have been admitted to and registered on a course have the right to receive tuition and/or supervision for the duration of the time period specified for the particular course to which they were accepted (see, the university's admission regulations (in Swedish)). After that, the right to receive tuition and/or supervision expires.

Reading list and other learning resources

Required Reading

Dhillon, Gurpreet (2018)
Information Security: Text & Cases
Prospect Press, 413 pages

Additions and Comments

The standards that are used during the course will be made available via the University library's homepage. Additional research papers and course material will be made available by the department, approximately 200 pages.