Syllabus for Secure Computer Systems I

Säkra datorsystem I


  • 5 credits
  • Course code: 1DT072
  • Education cycle: Second cycle
  • Main field(s) of study and in-depth level: Computer Science A1N, Technology A1N
  • Grading system: Fail (U), Pass (3), Pass with credit (4), Pass with distinction (5)
  • Established: 2010-03-18
  • Established by:
  • Revised: 2022-10-17
  • Revised by: The Faculty Board of Science and Technology
  • Applies from: Autumn 2023
  • Entry requirements:

    120 credits including 15 credits in mathematics and 30 credits in computer science or technology. Distributed Information Systems or participation in courses with operating systems and computer networks. 10 credits in programming. Proficiency in English equivalent to the Swedish upper secondary course English 6.

  • Responsible department: Department of Information Technology

Learning outcomes

On completion of the course, the student should be able to:

  • explain basic concepts, theories and principles for security in computer systems, such as identification, authenticity and access control
  • explain principles for attacks and protective measures in different aspects of computer systems, such as operating systems, software, networks and web based systems
  • identify weaknesses and strengths concerning the security in computer systems
  • discuss ethical aspects of computer systems security and its application
  • present and discuss the course content orally and in writing with proficiency appropriate to the course level


The course focuses on practical aspects of security including operating systems, software, networks and web-based system. Basic concepts such as identification, authentication and access control. Principles of attack and defence mechanisms. Ethical aspects of computer systems security and its application.


Lectures, seminars, labs, assignments.


The course is examined by oral and written examination spread out through the course and a written examination.

If there are special reasons for doing so, an examiner may make an exception from the method of assessment indicated and allow a student to be assessed by another method. An example of special reasons might be a certificate regarding special pedagogical support from the disability coordinator of the university.

Reading list

Reading list

Applies from: Autumn 2023

Some titles may be available electronically through the University library.

  • Pfleeger, Charles P.; Pfleeger, Shari Lawrence.; Margulies, Jonathan. Security in computing

    Fifth edition.: Upper Saddle River, NJ: Prentice Hall, [2015]

    Find in the library


Last modified: 2022-04-26