Skip to main content

Digital security and cyber hygieneLaajuus (5 cr)

Code: PO00EP08

Credits

5 op

Teaching language

  • Finnish

Objective

The student understands the significance of the personal cyber hygiene to the information security of the society and information security of the company.
The student knows the legislation, information security and privacy.
The student knows the differences between a cyber security and information security. The student can identify information security risks and can make improvement proposal to avoiding them.
The student can protect his own operation on the cyberspace and reduce the risk to be subjected to the attack as a worker of the company and as a private person.
The student knows the controls and theory models to build protection, the most general, information security.
The student knows social and the significance for the high-quality implementation of the information security from the point of view of the organisation.
The student knows how the industry systems should be protected and can require and it can discuss with other professionals who work in the field from these.

Content

Basic concepts of the information security
Information security risks, their effects and rejection.
Information security generally
Laws which are related to the information security
Information security standards and certificates
Encryption methods
Osint

Enrollment

08.04.2024 - 21.04.2024

Timing

02.09.2024 - 22.12.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Informaatioteknologian koulutusyksikkö

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

20 - 30

Degree programmes
  • Degree Programme in Game Technology
  • Degree Programme in Game Programming
Teachers
  • Marko Oras
Teacher in charge

Marko Oras

Groups
  • PTKT22SP
    Game technologies, full-time studies

Objective

The student understands the significance of the personal cyber hygiene to the information security of the society and information security of the company.
The student knows the legislation, information security and privacy.
The student knows the differences between a cyber security and information security. The student can identify information security risks and can make improvement proposal to avoiding them.
The student can protect his own operation on the cyberspace and reduce the risk to be subjected to the attack as a worker of the company and as a private person.
The student knows the controls and theory models to build protection, the most general, information security.
The student knows social and the significance for the high-quality implementation of the information security from the point of view of the organisation.
The student knows how the industry systems should be protected and can require and it can discuss with other professionals who work in the field from these.

Content

Basic concepts of the information security
Information security risks, their effects and rejection.
Information security generally
Laws which are related to the information security
Information security standards and certificates
Encryption methods
Osint

Opiskelumateriaali

Study materials will be announced on the course's Learn platform and, as appropriate, on the course's Teams team.

Yksilölliset oppimisväylät

Weekly-based learning pathway:
You participate in teaching and supervision as scheduled. Your studies will be paced according to schedules of the group meetings and the independent learning tasks.

Accelerated learning pathway:
The method of participation must be agreed before the beginning of the course. If you work in a company, organization or project offered by a university, you can complete the course or module in your workplace / project either in full or in part.
In this case, you are in contact with the teacher of the course at the beginning of the course and agree on a development task for your workplace / project. Learning requires that in your work, you become acquainted with the themes covered in the course, and master them both in theory and in practice.

TKI ja työelämäyhteistyö

None

Tentit ja muut määräajat

The course ends at the time indicated in the implementation schedule, by which time the student has returned the required assignments, completed any exams and met all other requirements for the approved completion of the course.

Opiskelijan työmäärä

The workload of the student is 135h, of which approx. 55h are lectures and group work under the guidance of a teacher, in accordance with the rules of procedure. Approx. 80 h are homework and assignments that can be worked on independently.

Evaluation scale

1-5

Assessment methods and criteria

Assignments, exams and participation in contact teaching.

Enrollment

08.04.2024 - 21.04.2024

Timing

26.08.2024 - 22.12.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Informaatioteknologian koulutusyksikkö

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

20 - 30

Degree programmes
  • Degree Programme in Game Programming
Teachers
  • Marko Oras
Teacher in charge

Marko Oras

Groups
  • POKT22SP
    Game programming, full-time studies

Objective

The student understands the significance of the personal cyber hygiene to the information security of the society and information security of the company.
The student knows the legislation, information security and privacy.
The student knows the differences between a cyber security and information security. The student can identify information security risks and can make improvement proposal to avoiding them.
The student can protect his own operation on the cyberspace and reduce the risk to be subjected to the attack as a worker of the company and as a private person.
The student knows the controls and theory models to build protection, the most general, information security.
The student knows social and the significance for the high-quality implementation of the information security from the point of view of the organisation.
The student knows how the industry systems should be protected and can require and it can discuss with other professionals who work in the field from these.

Content

Basic concepts of the information security
Information security risks, their effects and rejection.
Information security generally
Laws which are related to the information security
Information security standards and certificates
Encryption methods
Osint

Opiskelumateriaali

Study materials will be announced on the course's Learn platform and, as appropriate, on the course's Teams team.

Yksilölliset oppimisväylät

Weekly-based learning pathway:
You participate in teaching and supervision as scheduled. Your studies will be paced according to schedules of the group meetings and the independent learning tasks.

Accelerated learning pathway:
The method of participation must be agreed before the beginning of the course. If you work in a company, organization or project offered by a university, you can complete the course or module in your workplace / project either in full or in part.
In this case, you are in contact with the teacher of the course at the beginning of the course and agree on a development task for your workplace / project. Learning requires that in your work, you become acquainted with the themes covered in the course, and master them both in theory and in practice.

TKI ja työelämäyhteistyö

None

Tentit ja muut määräajat

The course ends at the time indicated in the implementation schedule, by which time the student has returned the required assignments, completed any exams and met all other requirements for the approved completion of the course.

Opiskelijan työmäärä

The workload of the student is 135h, of which approx. 55h are lectures and group work under the guidance of a teacher, in accordance with the rules of procedure. Approx. 80 h are homework and assignments that can be worked on independently.

Evaluation scale

1-5

Assessment methods and criteria

Assignments, exams and participation in contact teaching.