Nsm Brochure


Published on

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Nsm Brochure

  1. 1. NordSecMob Master's Programme in Security and Mobile Computing Mobile computing Data security Computer science Double degree Scholarships Coordinator: Helsinki University of Technology – TKK (Finland) Partners: The Royal Institute of Technology – KTH (Sweden) The Norwegian University of Science and Technology – NTNU (Norway) Technical University of Denmark – DTU (Denmark) http://nordsecmob.tkk.fi University of Tartu – UT (Estonia)
  2. 2. NordSecMob Master's Programme in Security and Mobile Computing http://nordsecmob.tkk.fi NordSecMob - Erasmus Mundus Programme NordSecMob - Master's Programme in Security and Mobile Computing is one of the European top-quality Masters Courses selected by the European Commission Erasmus Mundus pro- gramme. Erasmus Mundus, which is a co- operation and mobility programme, both pro- motes the European Union (EU) as a centre of excellence in higher education around the world and supports European top-quality Masters Courses. Erasmus Mundus -programmes offer culturally enriching higher education opportunities for both ICELAND European and Non-European students. Students from any country can apply to NordSec- Trondheim FINLAND Mob-Master’s programme in NORWAY SWEDEN Security and Mobile Computing. Espoo Non-European students have an RUSSIA ESTONIA Stockholm opportunity to apply for an Tartu Erasmus Mundus Scholarships. LATVIA DENMARK LITHUANIA IRELAND Copenhagen U. K. BYELARUS NETH . GERMANY POLAND BELGIUM UKRAIN LUX. CZECH SLOVAKIA FRANCE AUSTRIA HUNGARY ROMANIA Read more: http://ec.europa.eu/education/programmes/mundus/index_en.html EU Member States: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, United Kingdom EAA/EFTA states: Iceland, Norway, Liechtenstein EU Candidate States (presently): Croatia, Turkey and the Former Yugoslav Republic of Macedonia The NordSecMob-consortium is responsible for the information included in this brochure. 2 NordSecMob
  3. 3. The World is Changing Communications play a major role in today's world. The rise of sophisticated communications techniques and technologies is having a funda- mental and profound impact, and digital com- munications and mobile computing allow new levels of freedom and flexibility for people, com- panies, and governments. Mobile computing studies embrace all aspects related to wireless and mobile communication. The future is very much wireless, and thus this area of research and development is crucial for the next generation services and applications. Security and Mobile Computing Security is an integral part of today's IT world. Information flows need to be secured and communicating parties au- thenticated. Computer net- works, wired or wireless, are vulnerable to all kinds of at- tacks, and must be protected. And mobile computing presents a new range of security chal- lenges that must be addressed. Hence, security is an important part of in this curriculum. . Be Mobile – Join NordSecMob! Apply for the NordSecMob TKK programme and help shape the future! Not only will you gain in-depth knowledge and prac- tical know-how of the mobile revolution, but at the same time you will have a chance to experience the cultures of two north- ern European countries. 3 NordSecMob
  4. 4. Doub NordSecMob – Two Universities – Double Degree NordSecMob is a two-year Master of Science degree Programme (120 ECTS credits). During the programme, the students will study at two of the five Nordic partner universities: Helsinki University of Technology (TKK) in Finland, Tech- nical University of Denmark (DTU), The Royal Institute of Technology (KTH) in Sweden, The Norwegian University of Science and Technology (NTNU) and the University of Tartu (UT) in Esto- nia. After completing the two-year programme, successful students will be awarded two officially recognized M.Sc. degrees: one from each uni- versity where they studied. The programme offers students breadth and deep of knowledge in the field of computer science, data security and mobile comput- ing, both in theory and in practice. The pro- gramme develops the students' research skills to enable them to take up further studies at PhD level; it also provides experience of international R&D environments, and enables access to major international networks. 4 NordSecMob
  5. 5. le Degree 5 NordSecMob
  6. 6. Joint Study Programme A joint curriculum is defined for the programme and it involves always two universities. The 120 ECTS credit points are divided into two blocks: 1-2 semesters of teaching (30-60 ECTS credit points) will be provided by the home university and 1-2 semesters of teaching (30-60 ECTS credit points) will be provided by the host uni- versity. The programme includes three semes- ters of courses followed by a fourth research semester (Master's thesis, 30 ECTS) under su- pervision and evaluation by both the home and host university. The student takes courses fo- cusing on advanced topics on the selected area of specialization: TKK 1st autumn 1st year DTU 1st spring KTH NTNU UT 2nd 2nd year autumn 2nd spring Joint Study Pr 6 NordSecMob
  7. 7. TKK: Technical Information Security and Network Services KTH: Communications Systems Design NTNU: Information Security DTU: Software Security UT: Mathematical Foundations of Cryptography KTH NTNU DTU DTU TKK NTNU UT TKK KTH UT Master´s Thesis ogramme The first autumn term studies are taken at one of the three universities: TKK, KTH or NTNU. Students with the specialization quot;Software Securityquot; move from home university to DTU for the first spring semester and stay second year at DTU. Students with other specialization tracks move after first year studies to other (TKK, NTNU, KTH and UT) for the second autumn semester. 7 NordSecMob
  8. 8. Content of the Programme TKK: Technical Information Security and Network Services The focus of the first autumn at TKK is hands on learning of security and computer networks through laboratory works and with emphasis on basic courses of security and mobile com- puting. The first spring concentrates on ad- vanced courses in mobile computing, security, and services including interactive courses, project works and seminars. The focus of the studies of the second autumn is on advanced courses in mobile computing, security, and services including interactive courses, project works and seminars. KTH: Communications Systems Design The focus of the first autumn at KTH is on com- munication security, including advanced topics in networking and security, theory and laboratory exercises. The focus of the first spring is on problem-oriented, project-driven learning in teams addressing real-life problems in the com- munication systems area, with external project owners, optionally in parallel with a few technical specialization courses on mobile services. The focus of the second autumn at KTH is on ad- vanced operator related topics, including tech- nical network management, technology man- agement and business management/creation. KTH 8 NordSecMob
  9. 9. NTNU: Information Security The focus of the first autumn at NTNU is on basic networking courses, dependability, per- formance, simulation and basic cryptography. The focus of the first spring is on communication security, including basic topics in networking and security, theory and laboratory exercises and topics on technology management and busi- ness management/creation. The focus of the second autumn at NTNU is on advanced topics in networking and security with a minor thesis on a specialization topic, security management. DTU – Software Security At DTU, the focus is on Safe and Secure IT- Systems: Methods, tools and techniques for design, implementation, and validation of safe and secure IT-systems. Covering Network Tech- nology (privacy and intrusion detection) as well as Language Based Technology (program anal- ysis, operational semantics, process calculi, and software validation). UT – Mathematical Foundations of Cryptography The focus of the studies at Tartu is on strong theoretical foundation on cryptography, crypto- graphic solutions, construction of secure proto- cols, and related fields of mathematics (e.g., combinatorics and number theory). . 9 NordSecMob
  10. 10. Consortium Partner Consortium Partners The consortium is made up of renowned research and educational institutions in Europe and top-ranking universities of technology in the Nordic countries. For further information see http://nordsecmob.tkk.fi/research.html Helsinki University of Technology – TKK poo, neighbor city of Helsinki. The Depart- TKK was founded in 1849 and received ment of Computer Science and Engineer- university status in 1908. There are twelve ing at TKK is coordinating the NordSec- faculties with 19 degree programmes and Mob-programme. 250 professors. 15 000 under- and post- graduate students are studying at TKK. The campus is located in Otaniemi in Es- In the TKK NordSecMob-programme the research focus is on the evolution of the Internet technologies as well as on the design, implementation, and verification of IP based systems. In addition to the Internet technologies, research addresses mobile networks and specifically the de- velopment of applications and services in heterogeneous network environments. Focal areas for both Internet and mobile networks are security, service architec- tures and subjects related to service man- agement such as mobility, quality-of- service and charging. Security issues in- cluding privacy, trust and identity man- agement are central for this research group. . 10 NordSecMob
  11. 11. s The Royal Institute of Technology – KTH KTH was founded in 1827 and is the largest of Sweden's universities of technology. It consists of nine schools with over 11,000 undergraduate students, 1,500 active postgraduate students and a staff of 3,100 people. There are four campuses with the main campus in central Stockholm. The KTH part of the programme is organised under the KTH School of ICT. integration of IP and optics, as well as The ICT school of KTH conducts research architectures for network systems with on communication systems, including particular focus on decentralized, modu- their use, policy and regulation of com- larized approaches to network system munication markets, design and imple- design. Security aspects related to distrib- mentation of applications, services and uted service architectures, proxy systems, network systems. In the area of commu- and secure voice over IP communication nication systems design, the main re- are important areas of research. . search topics are network architectures and protocols for the future Internet, the The Norwegian University of Science and Technology – NTNU of Norway. The Department of Telematics NTNU was established in 1996 as a further ITEM is responsible for the teaching of development of the University of Trond- the courses in the NordSecMob-prog- heim (UNiT). NTNU has seven faculties ramme at NTNU. and the faculty of Information Technology, Mathematics and Electrical Engi- The Department of neering has six de- Telematics focuses partments. There its information se- are 20,000 students, curity research on half of these study- two main topics: ing technology or the natural sciences Security as a pivotal ingredient of Quanti- and a staff of 3,300 of which over half in tative Quality of Service and cryptographic academic or scientific positions. NTNU is protocols. Modelling, design, analysis and located in Trondheim, on the western coast evaluation of information security for ICT 11 NordSecMob
  12. 12. Photo: NTNU Info/Rune Petter Ness systems, services and protocols have in tographic functions for securing distribut- the past most frequently been performed ed computerized communication systems, by using qualitative principles, methods their goals being to restrict, establish and and measures. However, in the present preserve the security properties of infor- transition into an end user environment mation. A specific long-standing inquiry dominated by ubiquitous computing power in the field of crypto-protocols is that of and service realization, the information defining and constructing information pri- security research needs to be focused on vacy, for instance in digital cash and e- the quantitative aspects of description and voting schemes. Digital Tracks is another negotiation of perceived QoS. Crypto- research activity which addresses both graphic Protocols can be considered as privacy and forensic concerns. distributed algorithms that employ cryp- Technical University of Denmark – DTU ence and Engineering section at the Infor- DTU was originally founded matics and Mathematical Modelling de- as the College of Advanced partment at DTU is responsible for the Technology in 1829. DTU has teaching of the programme. The teaching a high international stan- in safe and secure IT-systems is an estab- dard within the technical- lished part of DTU's engineering curricu- natural sciences, based on lum and supported by active research at 15 individual departments as well as a the department. number of research centers on campus in Kongens Lyngby, the Copenhagen Met- ropolitan area. The University has approx- In the DTU NordSecMob-programme there imately 900 researchers, 6,000 students are two main research components. One and 600 PhD students. The Computer Sci- deals with software security and focuses 12 NordSecMob
  13. 13. on techniques that can be used to validate designs of systems for the absence of security flaws and to develop systems that can be relied upon to adhere to given se- curity policies. To be specific, research on communication protocols using static analysis, originally developed in the EU- project DEGAS, has successfully used to validate a number of voting and single- sign on protocols; research on access Photo: Bo Jarner control and information flow, including the Decentralised Label Model, gives con- crete techniques for constructing software systems where code is guaranteed to are likely to give users privacy and ano- satisfy given confidentiality, integrity or nymity; another focus is the study of in- authenticity properties. Another deals with trusion detection systems and how they system security and network security. One can best be configured to protect the user. focus is on how to construct systems that University of Tartu – UT UT was originally founded as Academia clinics. The total number of students is Dorpatensis (Gustaviana) in 1632 and it over 18,000, with a teaching staff of 1,300. was reopened in 1802. UT has 11 faculties, UT is located in Tartu, in the southeast 3 research institutes and 6 colleges with part of Estonia. The responsibility of the more than 70 departments, institutes and teaching of the programme at University of Tartu is on the Institute of Computer Science of the Department of Mathematics and Computer Science. The main NordSecMob-related research areas in Tartu University are data security and cryptography. The interests of our working group reach from practical secu- rity analysis to foundations of cryptograph- ic primitives. The main research topics are the following: security models based on attack trees, economics of security, privacy preserving data mining, formal proof systems for cryptographic protocols and properties of hash functions and ap- plications of hash functions in digital time- stamping. 13 NordSecMob
  14. 14. NordSecMob Admission Requirements cate. Either a TOEFL or IELTS test is ac- cepted, with the following minimum total scores: The NordSecMob-programme is targeted for top-quality students of all nationalities. TOEFL minimum scores are 580 (PBT), 237 (CBT) and 92 (iBT). The admission criteria to the programme is a high quality Bachelor's degree en- compassing a minimum of 180 ECTS IELTS minimum score is 6,5 credits in Engineering (Computer Science or Information technology) or equivalent For details, check NordSecMob-website. studies, i.e., must be a degree of at least http://nordsecmob.tkk.fi three years of full-time studies. The applicants should have solid knowledge of mathematics (discrete m a t h e m a t i c s ) , p ro - gramming skills, data structures and algo- rithms, computer archi- tecture and basics of computer networks. In addition, a basic knowl- edge of following subject areas will be an advan- tage: databases and da- tabase management, principles of theoretical computer sci- Application deadline and ence, logic in computer science, software selection criteria engineering, operating systems, and con- current programming. The annual application deadline is the beginning of January. Details of required The language of instruction of the Nord- application documents and the on-line SecMob-programme is English. Thus, application form are on the NordSecMob- applicants must have a good command website. Admission to the programme is of English and most applicants must granted on a competitive basis. present an official language test certifi- 14 NordSecMob
  15. 15. Scholarships for Students and Staff Erasmus Mundus-scholarships The amount of an average three-month scholarship for scholars is 13,000 Euro. for Non-European students This includes three monthly grants of 4,000 Euro and a fixed amount of 1,000 Non-European students can apply for Euro for travel expenses. generous EU-funded Erasmus Mun- dus scholarships. Eligible for the Er- Nordplus-scholarships for all asmus Mundus scholarships are stu- dents who are NOT nationals of the EU nationalities member states, the EEA-states nor nationals of the candidate countries The selected NordSecMob-students for accession to the EU. Furthermore, can apply for Nordplus-scholar- eligible students may not be residents ships for the mobility period (max 10 of the EU/EEA/candidate countries, months) to the host university. All na- nor may they have carried out their tionalities can apply for the Nordplus- main activities (study, work, etc) for scholarships. more than a total of 12 months over the last five years in the EU/EEA/can- Erasmus-scholarships for didate countries. These scholarships European students are awarded to the best students on a competitive basis. The European students selected to NordSecMob-programme can apply The Erasmus Mundus scholarship to- for Erasmus-scholarships for the mo- tals 21,000 Euro per academic year. bility period to the host university. This includes 10 monthly grants of 1,600 Euro and a fixed amount of 5,000 NordSecMob-consortium Euro for fees, travel expenses, reloca- scholarships for EU/EEA tion costs, etc. For NordSecMob-pro- citizens gramme lasting two years the student receives 42,000 Euro. The NordSecMob-consortium offers scholarships for excellent EU/EEA citi- Erasmus Mundus scholarships zens. For details, check NordSecMob- for Non-European scholars website http://nordsecmob.tkk.fi A scholar is an academic and/or pro- Programme fee fessional of outstanding experience who carries out teaching or research There is no programme fee for assignments and scholarly work in the EU/EEA students. The programme institutions participating in the Nord- fee is charged from any other than EU SecMob-programme. Erasmus Mun- member state and EEA nationals. The dus scholarships allow Non-European programme fee is announced on the scholars to perform the tasks defined NordSecMob-website. by the consortium for a maximum of three months. 15 NordSecMob
  16. 16. Helsinki University of Technology http://www.tkk.fi/ The Royal Institute of Technology http://www.kth.se/ Photo: Vadim Makarov www.vad1.com The Norwegian University of Science and Technology http://www.ntnu.no/ Contact Information NordSecMob Consortium Technical University Faculty of Information Photo: Bo Jarner and Natural Sciences of Denmark Helsinki University of Technology TKK http://www.dtu.dk/ Coordinator Ms Eija Kujanpää street Konemiehentie 2 (P.O. Box 5400) 02015 TKK, city: Espoo Finland email: nordsecmob@tkk.fi tel: +358-9-451 4773 fax +358-9-451 3015 University of Tartu http://nordsecmob.tkk.fi http://www.ut.ee/