Master's level
- Bachelor of Science in Engineering (at least 180 credits) or a bachelor’s degree in computer science or related fields such as computer engineering, computer and information science, software engineering, informatics, telecommunications or electrical engineering.
- At least 15 credits in programming.
- Equivalent of English 6 in secondary school.
This course is part of the main field of computer science and may be included in the degree requirements for the master’s degree (120 credits) in computer science.
The course includes:
- Software technologies for secure IoT-based systems
- Distributed IoT-based systems, middleware and methods for system integration
- Reference architectures for the IoT, e.g., warehouse architectures, cloud-based architectures, and edge computing
- Quality characteristics and metrics for IoT-based system architectures, including energy efficiency
- Basic security perspectives for IoT-based systems
- Methods for vulnerability and threat analysis
- Attack scenarios and the cybercrime ecosystem
- Safety-enhancing techniques and strategies for protection
Knowledge and understanding
To pass the course, the student must be able to:
1. account for the most common architecture types of IoT-based systems including their quality characteristics,
2. account for basic techniques for secure software within IoT-based systems.
Skills and abilities
To pass the course, the student must be able to:
3. choose and implement appropriate architectures for secure IoT-based systems,
4. apply proven methods for vulnerability and threat analysis,
5. analyse and assess attack scenarios and design strategies for risk reduction.
Judgement and approach
To pass the course, the student should be able to:
6. analyse and assess different architectural solutions and trade-offs,
7. critically analyse cybercrime ecosystems and assess their effect on IoT-based systems.
Lectures, seminars, laboratory sessions and independent study.
In order to achieve a passing grade (A-E) all the parts must have been completed with a grade of E or G.
- Passed written exam (10 credits) – learning outcomes 1, 2, 5, 6 & 7
- Passed laboratory work (5 credits) – learning outcomes 3 & 4
The final grade is the same as for the written exam.
Laboratory work is assessed with grades UG.
Reference materials:
- Anderson, Ross (2021). Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition. John Wiley & Sons. https://www.wiley.com/en-us/Security+Engineering:+A+Guide+to+Building+Dependable+Distributed+Systems,+3rd+Edition-p-9781119642787
- Bass, Len, Clements, Paul & Kazman, Rick (2012). Software architecture in practice. 3. ed. Upper Saddle River, N.J.: Addison-Wesley, ISBN-13: 9780321815736
- Relevant scientific articles on the topic of future ethics.
The University provides students who are taking or have completed a course with the opportunity to share their experiences of and opinions about the course in the form of a course evaluation that is arranged by the University. The University compiles the course evaluations and notifies the results and any decisions regarding actions brought about by the course evaluations. The results shall be kept available for the students. (HF 1:14).
When a course is no longer given, or the contents have been radically changed, the student has the right to re-take the examination, which will be given twice during a one year period, according to the syllabus which was valid at the time of registration.
If a student has a Learning support decision, the examiner has the right to provide the student with an adapted test, or to allow the student to take the exam in a different format.
The syllabus is a translation of a Swedish source text.