The course presents and discusses different aspects of the relationships that exist between security and technology.
First of all, we need to realize that we are living in a "risk society" where - among others because of our strong dependence on all kinds of simple or complex, more or less interwoven technical infrastructures - we are constantly "at risk". The technical infrastructures include (international) energy (i.e., oil, gas, coal and electricity etc.) supply, (world-wide) transport infrastructures (by road, train, water, underground, air, etc.), main ports (within transportation networks of people and goods), supply chains, healthcare organization and crisis recovery networks, dikes, dams & other water retaining structures, communication and IT infrastructures including the Internet. For the well functioning of society, we have to deal - both in preventive and detective and corrective ways - with the safety and security risks related to possible disruptions of one or more technical infrastructures.
Secondly, specific and well-tailored technology can be used, in an engineering approach, as an enabler to solve security problems in all kinds of domains (starting at home and scaling up till international levels in both the private and public domain) by the application of smart camera's, smart communication facilities, (computerized) devices for remote sensing and control, (RFID-based) tracking ands tracing, scanning apparatus, applied cryptography, data analysis and data mining, smart keys, fire fighting equipment, back-up facilities, and much more.
Thirdly, understanding generic methodologies to solve safety and security-related problems, often based on technical, institutional, process or (risk) policy analysis & design approaches, is considered of crucial importance in this course.
The course is consists of the following sub-courses:
* Society at risk: a sociologic view on modern society focussing on interweaving and interdependent technological and organizational relationships
* Security of critical infrastructures
* Security of ICT as enabling technology
* Security of ICT as critical infrastructure itself (especially the Internet)
* Security management issues.
The final grade is based on a weighted average of the individual assignments, the group assignments, and, if applicable, the final examination. The precise weighting is determined based on the number of students that choose this course.