Digital security and cyber hygieneLaajuus (5 cr)
Code: PO00EP08
Credits
5 op
Teaching language
- Finnish
Objective
The student understands the significance of the personal cyber hygiene to the information security of the society and information security of the company.
The student knows the legislation, information security and privacy.
The student knows the differences between a cyber security and information security. The student can identify information security risks and can make improvement proposal to avoiding them.
The student can protect his own operation on the cyberspace and reduce the risk to be subjected to the attack as a worker of the company and as a private person.
The student knows the controls and theory models to build protection, the most general, information security.
The student knows social and the significance for the high-quality implementation of the information security from the point of view of the organisation.
The student knows how the industry systems should be protected and can require and it can discuss with other professionals who work in the field from these.
Content
Basic concepts of the information security
Information security risks, their effects and rejection.
Information security generally
Laws which are related to the information security
Information security standards and certificates
Encryption methods
Osint
Enrollment
08.04.2024 - 21.04.2024
Timing
02.09.2024 - 22.12.2024
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Department of Information Technology
Campus
Kotka Campus
Teaching languages
- Finnish
Seats
20 - 30
Degree programmes
- Degree Programme in Game Technology
- Degree Programme in Game Programming
Teachers
- Marko Oras
Teacher in charge
Marko Oras
Groups
-
PTKT22SPGame technologies, full-time studies
Objective
The student understands the significance of the personal cyber hygiene to the information security of the society and information security of the company.
The student knows the legislation, information security and privacy.
The student knows the differences between a cyber security and information security. The student can identify information security risks and can make improvement proposal to avoiding them.
The student can protect his own operation on the cyberspace and reduce the risk to be subjected to the attack as a worker of the company and as a private person.
The student knows the controls and theory models to build protection, the most general, information security.
The student knows social and the significance for the high-quality implementation of the information security from the point of view of the organisation.
The student knows how the industry systems should be protected and can require and it can discuss with other professionals who work in the field from these.
Content
Basic concepts of the information security
Information security risks, their effects and rejection.
Information security generally
Laws which are related to the information security
Information security standards and certificates
Encryption methods
Osint
Opiskelumateriaali
Study materials will be announced on the course's Learn platform and, as appropriate, on the course's Teams team.
Yksilölliset oppimisväylät
Weekly-based learning pathway:
You participate in teaching and supervision as scheduled. Your studies will be paced according to schedules of the group meetings and the independent learning tasks.
Accelerated learning pathway:
The method of participation must be agreed before the beginning of the course. If you work in a company, organization or project offered by a university, you can complete the course or module in your workplace / project either in full or in part.
In this case, you are in contact with the teacher of the course at the beginning of the course and agree on a development task for your workplace / project. Learning requires that in your work, you become acquainted with the themes covered in the course, and master them both in theory and in practice.
TKI ja työelämäyhteistyö
None
Tentit ja muut määräajat
The course ends at the time indicated in the implementation schedule, by which time the student has returned the required assignments, completed any exams and met all other requirements for the approved completion of the course.
Opiskelijan työmäärä
The workload of the student is 135h, of which approx. 55h are lectures and group work under the guidance of a teacher, in accordance with the rules of procedure. Approx. 80 h are homework and assignments that can be worked on independently.
Evaluation scale
1-5
Assessment methods and criteria
Assignments, exams and participation in contact teaching.
Enrollment
08.04.2024 - 21.04.2024
Timing
26.08.2024 - 22.12.2024
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Department of Information Technology
Campus
Kotka Campus
Teaching languages
- Finnish
Seats
20 - 30
Degree programmes
- Degree Programme in Game Programming
Teachers
- Marko Oras
Teacher in charge
Marko Oras
Groups
-
POKT22SPGame programming, full-time studies
Objective
The student understands the significance of the personal cyber hygiene to the information security of the society and information security of the company.
The student knows the legislation, information security and privacy.
The student knows the differences between a cyber security and information security. The student can identify information security risks and can make improvement proposal to avoiding them.
The student can protect his own operation on the cyberspace and reduce the risk to be subjected to the attack as a worker of the company and as a private person.
The student knows the controls and theory models to build protection, the most general, information security.
The student knows social and the significance for the high-quality implementation of the information security from the point of view of the organisation.
The student knows how the industry systems should be protected and can require and it can discuss with other professionals who work in the field from these.
Content
Basic concepts of the information security
Information security risks, their effects and rejection.
Information security generally
Laws which are related to the information security
Information security standards and certificates
Encryption methods
Osint
Opiskelumateriaali
Study materials will be announced on the course's Learn platform and, as appropriate, on the course's Teams team.
Yksilölliset oppimisväylät
Weekly-based learning pathway:
You participate in teaching and supervision as scheduled. Your studies will be paced according to schedules of the group meetings and the independent learning tasks.
Accelerated learning pathway:
The method of participation must be agreed before the beginning of the course. If you work in a company, organization or project offered by a university, you can complete the course or module in your workplace / project either in full or in part.
In this case, you are in contact with the teacher of the course at the beginning of the course and agree on a development task for your workplace / project. Learning requires that in your work, you become acquainted with the themes covered in the course, and master them both in theory and in practice.
TKI ja työelämäyhteistyö
None
Tentit ja muut määräajat
The course ends at the time indicated in the implementation schedule, by which time the student has returned the required assignments, completed any exams and met all other requirements for the approved completion of the course.
Opiskelijan työmäärä
The workload of the student is 135h, of which approx. 55h are lectures and group work under the guidance of a teacher, in accordance with the rules of procedure. Approx. 80 h are homework and assignments that can be worked on independently.
Evaluation scale
1-5
Assessment methods and criteria
Assignments, exams and participation in contact teaching.