Syllabus

Title
1795 Security and Privacy
Instructors
Sajjad Khan, MSc., Dr. Edin Arnautovic
Contact details
Type
PI
Weekly hours
2
Language of instruction
Englisch
Registration
09/23/24 to 09/26/24
Registration via LPIS
Notes to the course
Subject(s) Master Programs
Dates
Day Date Time Room
Monday 10/14/24 02:00 PM - 04:00 PM TC.0.02
Monday 10/21/24 02:00 PM - 04:00 PM TC.4.03
Monday 10/28/24 02:00 PM - 04:00 PM TC.4.03
Monday 11/04/24 02:00 PM - 04:00 PM TC.4.03
Monday 11/11/24 02:00 PM - 04:00 PM TC.4.03
Monday 11/18/24 02:00 PM - 04:00 PM TC.4.03
Monday 11/25/24 02:00 PM - 04:00 PM Online-Einheit
Monday 01/13/25 02:00 PM - 06:00 PM TC.4.03
Monday 01/20/25 02:00 PM - 04:00 PM TC.4.03
Wednesday 01/29/25 07:00 PM - 09:00 PM TC.1.01 OeNB
Contents

This is a graduate level course that is focusing on security and privacy issues in complex socio-cyber-physical systems from the threat modeling perspective. The students will learn and apply a systematic security and privacy threat modeling approach, and at the same time be exposed to and learn about a selection of the standard security and privacy problems, attacks, and development challenges. The course will also expose the students to a selection of the current security and privacy research and development challenges.

Learning outcomes
  1. Be able to identify and fix security and privacy threats
  2. Learn to use practical and actionable tools, techniques, and approaches for security and privacy
  3. Explore the nuances of software-centric security and privacy threat modeling and discover its application to software and systems during the build phase and beyond
  4. Apply threat modeling to improve security and privacy when managing complex systems
  5. Manage potential security and privacy threats using a structured, methodical framework
  6. Discover and discern evolving security and privacy threats
Attendance requirements

According to the examination regulation full attendance is intended for a PI. 80% attendance required to pass the course.

Teaching/learning method(s)

The required textbook for this course is “Threat Modeling: Designing for Security,” 1st Edition, by Adam Shostack, Wiley, ISBN-13: 978-1118809990. The required textbook will be complemented by a selection of additional readings as required by the current offering of the course.

 

Assessment

There will be 5 evaluations:

1.       Project deliverable 1: Project Idea, Title, List of References (Deadline Monday 3rd Week  11:59 PM; 5 marks; minimum 5 references; List should contain 60 References)

2.       Project deliverable 2: Detailed Summary of 5 Papers from the approved list of References by Individual Student in the group. (Deadline Monday 6th Week 11:59 PM; 10 marks; Total Refereces =20)

3.       Project deliverable 3: Detailed Summary of 10 Papers from the approved list of References by Individual Student in the group (Deadline Monday 8th Week 11:59 PM; 10 marks; Total Refereces =40)

4.       Project deliverable 4: Complete project report should contain all 15 papers assigned to each student. (Deadline Friday 02/07/25 11:59 PM; 25 marks; Total Refereces =60)

5.       Final Exam (Monday 01/29/25: 19:00 to 21:00 Hours ; 50 marks)

 

Grading Criteria 

unsatisfactory: ≤ 60%

sufficient: > 60 % to ≤ 70 %

satisfactory: > 70 % to ≤ 80 %

good: > 80 % to ≤ 90 %

excellent: > 90 %

 

Readings

Please log in with your WU account to use all functionalities of read!t. For off-campus access to our licensed electronic resources, remember to activate your VPN connection connection. In case you encounter any technical problems or have questions regarding read!t, please feel free to contact the library at readinglists@wu.ac.at.

Other

 

 

Last edited: 2024-10-04



Back