Syllabus for Secure Computer Systems I

Säkra datorsystem I

A revised version of the syllabus is available.


  • 5 credits
  • Course code: 1DT072
  • Education cycle: Second cycle
  • Main field(s) of study and in-depth level: Computer Science A1N, Technology A1N
  • Grading system: Fail (U), Pass (3), Pass with credit (4), Pass with distinction (5)
  • Established: 2010-03-18
  • Established by: The Faculty Board of Science and Technology
  • Revised: 2012-04-25
  • Revised by: The Faculty Board of Science and Technology
  • Applies from: Autumn 2012
  • Entry requirements:

    120 credits including at least 15 credits within mathematics and 30 credits in computer science, including computer architecture, operating systems/process-oriented programming, computer networks, and a type programming II course.

  • Responsible department: Department of Information Technology

Learning outcomes

In order to pass, the student must be able to:

  • explain basic concepts, theories and principles for security in computer systems, such as identification, authenticity and access control
  • explain principles for attacks and protective measures in different aspects of computer systems, such as operating systems, software, networks and web based systems
  • identify weaknesses and strengths concerning the security in computer systems
  • present and discuss the course content orally and in writing with proficiency appropriate to the course level


The course focuses on practical aspects of security including operating systems, software, networks and web-based system. Basic concepts such as identification, authentication and access control. Principles of attack and defence mechanisms.


Lectures, seminars, labs, assignments


The course is examined by oral and written examination spread out through the course and a written examination.

Reading list

Reading list

Applies from: Spring 2014

Some titles may be available electronically through the University library.

  • Bishop, Matthew Computer security : art and science

    Boston: Addison-Wesley, cop. 2003

    Find in the library


Alternative course book (does not work for Secure Computer Systems II)

  • Bishop, Matt Introduction to computer security

    Boston: Addison-Wesley, cop. 2005

    Find in the library

Reading list revisions

Last modified: 2022-04-26