security_engineering
Differences
This shows you the differences between two versions of the page.
security_engineering [2018/08/25 15:31] – [Assessment Methods and Criteria] fabio.massacci@unitn.it | security_engineering [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 17: | Line 17: | ||
The course will introduce students to the key principles of Security Risk Assessment (Risk and Threat Analysis, Risk Assessment, Control Frameworks) both qualitatively and quantitatively. The student will identify threats and the corresponding security controls appropriate for two industrial case studies. | The course will introduce students to the key principles of Security Risk Assessment (Risk and Threat Analysis, Risk Assessment, Control Frameworks) both qualitatively and quantitatively. The student will identify threats and the corresponding security controls appropriate for two industrial case studies. | ||
+ | |||
+ | //Students interested in further exploring the research topics behind this area can also take a Software Project (6ECTS) or a Research Project (12ECTS) by contacting the lecturers.// | ||
+ | |||
==== Intended learning outcomes ==== | ==== Intended learning outcomes ==== | ||
Regular and active participation in the teaching activities offered by the course (lectures, laboratories and group work) and in independent study and project activities will enable students to: | Regular and active participation in the teaching activities offered by the course (lectures, laboratories and group work) and in independent study and project activities will enable students to: | ||
- | * understand the fundamentals of risk management; | + | |
* identify the relevant assets and the corresponding impacts of possible threats for a moderately complex case study; | * identify the relevant assets and the corresponding impacts of possible threats for a moderately complex case study; | ||
* mitigate threats with control according to the risk appetite of a relevant stakeholder; | * mitigate threats with control according to the risk appetite of a relevant stakeholder; | ||
Line 82: | Line 85: | ||
Being able to defend one's ideas in class is an important part of the evaluation (if a student cannot explain why s/he choses something him/her will get a negative vote for the relative exercise). | Being able to defend one's ideas in class is an important part of the evaluation (if a student cannot explain why s/he choses something him/her will get a negative vote for the relative exercise). | ||
+ | |||
+ | |||
+ | ==== Reference and Bibliographic Material ==== | ||
+ | |||
+ | The following books might be useful: | ||
+ | * [[http:// | ||
+ | |||
+ | Other recommended texts are | ||
+ | * [[http:// | ||
+ | * [[https:// | ||
===== Detailed Schedule and Additional Material ===== | ===== Detailed Schedule and Additional Material ===== |
security_engineering.1535203893.txt.gz · Last modified: (external edit)