Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Nsm Brochure
1. NordSecMob
Master's Programme
in Security and
Mobile Computing
Mobile computing
Data security
Computer science
Double degree
Scholarships
Coordinator:
Helsinki University of Technology – TKK (Finland)
Partners:
The Royal Institute of Technology – KTH (Sweden)
The Norwegian University of Science and
Technology – NTNU (Norway)
Technical University of Denmark – DTU (Denmark)
http://nordsecmob.tkk.fi University of Tartu – UT (Estonia)
2. NordSecMob
Master's Programme in Security and Mobile Computing
http://nordsecmob.tkk.fi
NordSecMob - Erasmus Mundus Programme
NordSecMob - Master's Programme in Security
and Mobile Computing is one of the European
top-quality Masters Courses selected by the
European Commission Erasmus Mundus pro-
gramme. Erasmus Mundus, which is a co-
operation and mobility programme, both pro-
motes the European Union (EU) as a centre of
excellence in higher education around the world
and supports European top-quality Masters
Courses.
Erasmus Mundus -programmes
offer culturally enriching higher
education opportunities for both ICELAND
European and Non-European
students. Students from any
country can apply to NordSec- Trondheim
FINLAND
Mob-Master’s programme in NORWAY SWEDEN
Security and Mobile Computing. Espoo
Non-European students have an RUSSIA
ESTONIA
Stockholm
opportunity to apply for an Tartu
Erasmus Mundus Scholarships. LATVIA
DENMARK
LITHUANIA
IRELAND
Copenhagen
U. K.
BYELARUS
NETH
.
GERMANY POLAND
BELGIUM
UKRAIN
LUX.
CZECH
SLOVAKIA
FRANCE AUSTRIA
HUNGARY
ROMANIA
Read more: http://ec.europa.eu/education/programmes/mundus/index_en.html
EU Member States: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France,
Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal,
Romania, Slovakia, Slovenia, Spain, Sweden, United Kingdom EAA/EFTA states: Iceland, Norway, Liechtenstein
EU Candidate States (presently): Croatia, Turkey and the Former Yugoslav Republic of Macedonia
The NordSecMob-consortium is responsible for the information included in this brochure.
2 NordSecMob
3. The World is Changing
Communications play a major role in today's
world. The rise of sophisticated communications
techniques and technologies is having a funda-
mental and profound impact, and digital com-
munications and mobile computing allow new
levels of freedom and flexibility for people, com-
panies, and governments.
Mobile computing studies embrace all aspects
related to wireless and mobile communication.
The future is very much wireless, and thus this
area of research and development is crucial for
the next generation services and applications.
Security and Mobile Computing
Security is an integral part of
today's IT world. Information
flows need to be secured and
communicating parties au-
thenticated. Computer net-
works, wired or wireless, are
vulnerable to all kinds of at-
tacks, and must be protected.
And mobile computing presents
a new range of security chal-
lenges that must be addressed.
Hence, security is an important
part of in this curriculum. .
Be Mobile –
Join NordSecMob!
Apply for the NordSecMob
TKK programme and help shape the
future! Not only will you gain
in-depth knowledge and prac-
tical know-how of the mobile
revolution, but at the same time you will have
a chance to experience the cultures of two north-
ern European countries.
3
NordSecMob
4. Doub
NordSecMob – Two Universities – Double Degree
NordSecMob is a two-year Master of Science
degree Programme (120 ECTS credits). During
the programme, the students will study at two
of the five Nordic partner universities: Helsinki
University of Technology (TKK) in Finland, Tech-
nical University of Denmark (DTU), The Royal
Institute of Technology (KTH) in Sweden, The
Norwegian University of Science and Technology
(NTNU) and the University of Tartu (UT) in Esto-
nia. After completing the two-year programme,
successful students will be awarded two officially
recognized M.Sc. degrees: one from each uni-
versity where they studied.
The programme offers students breadth and
deep of knowledge in the field of computer
science, data security and mobile comput-
ing, both in theory and in practice. The pro-
gramme develops the students' research skills
to enable them to take up further studies at PhD
level; it also provides experience of international
R&D environments, and enables access to major
international networks.
4 NordSecMob
6. Joint Study Programme
A joint curriculum is defined for the programme
and it involves always two universities. The 120
ECTS credit points are divided into two blocks:
1-2 semesters of teaching (30-60 ECTS credit
points) will be provided by the home university
and 1-2 semesters of teaching (30-60 ECTS
credit points) will be provided by the host uni-
versity. The programme includes three semes-
ters of courses followed by a fourth research
semester (Master's thesis, 30 ECTS) under su-
pervision and evaluation by both the home and
host university. The student takes courses fo-
cusing on advanced topics on the selected area
of specialization:
TKK
1st
autumn
1st year
DTU
1st
spring
KTH NTNU UT
2nd
2nd year autumn
2nd
spring
Joint Study Pr
6 NordSecMob
7. TKK: Technical Information Security and Network Services
KTH: Communications Systems Design
NTNU: Information Security
DTU: Software Security
UT: Mathematical Foundations of Cryptography
KTH NTNU
DTU DTU
TKK NTNU UT TKK KTH UT
Master´s Thesis
ogramme
The first autumn term studies are taken at one of the three universities: TKK, KTH or
NTNU. Students with the specialization quot;Software Securityquot; move from home university
to DTU for the first spring semester and stay second year at DTU. Students with other
specialization tracks move after first year studies to other (TKK, NTNU, KTH and UT) for
the second autumn semester.
7
NordSecMob
8. Content of the Programme
TKK: Technical Information Security
and Network Services
The focus of the first autumn at TKK is hands
on learning of security and computer networks
through laboratory works and with emphasis
on basic courses of security and mobile com-
puting. The first spring concentrates on ad-
vanced courses in mobile computing, security,
and services including interactive courses,
project works and seminars. The focus of the
studies of the second autumn is on advanced
courses in mobile computing, security, and
services including interactive courses, project
works and seminars.
KTH: Communications Systems
Design
The focus of the first autumn at KTH is on com-
munication security, including advanced topics
in networking and security, theory and laboratory
exercises. The focus of the first spring is on
problem-oriented, project-driven learning in
teams addressing real-life problems in the com-
munication systems area, with external project
owners, optionally in parallel with a few technical
specialization courses on mobile services. The
focus of the second autumn at KTH is on ad-
vanced operator related topics, including tech-
nical network management, technology man-
agement and business management/creation.
KTH
8 NordSecMob
9. NTNU: Information Security
The focus of the first autumn at NTNU is on
basic networking courses, dependability, per-
formance, simulation and basic cryptography.
The focus of the first spring is on communication
security, including basic topics in networking
and security, theory and laboratory exercises
and topics on technology management and busi-
ness management/creation. The focus of the
second autumn at NTNU is on advanced topics
in networking and security with a minor thesis
on a specialization topic, security management.
DTU – Software Security
At DTU, the focus is on Safe and Secure IT-
Systems: Methods, tools and techniques for
design, implementation, and validation of safe
and secure IT-systems. Covering Network Tech-
nology (privacy and intrusion detection) as well
as Language Based Technology (program anal-
ysis, operational semantics, process calculi,
and software validation).
UT – Mathematical Foundations of
Cryptography
The focus of the studies at Tartu is on strong
theoretical foundation on cryptography, crypto-
graphic solutions, construction of secure proto-
cols, and related fields of mathematics (e.g.,
combinatorics and number theory). .
9
NordSecMob
10. Consortium Partner
Consortium Partners
The consortium is made up of renowned research and educational institutions in Europe
and top-ranking universities of technology in the Nordic countries.
For further information see http://nordsecmob.tkk.fi/research.html
Helsinki University of Technology – TKK
poo, neighbor city of Helsinki. The Depart-
TKK was founded in 1849 and received
ment of Computer Science and Engineer-
university status in 1908. There are twelve
ing at TKK is coordinating the NordSec-
faculties with 19 degree programmes and
Mob-programme.
250 professors. 15 000 under- and post-
graduate students are studying at TKK.
The campus is located in Otaniemi in Es- In the TKK NordSecMob-programme the
research focus is on the evolution of the
Internet technologies as well as on the
design, implementation, and verification
of IP based systems. In addition to the
Internet technologies, research addresses
mobile networks and specifically the de-
velopment of applications and services in
heterogeneous network environments.
Focal areas for both Internet and mobile
networks are security, service architec-
tures and subjects related to service man-
agement such as mobility, quality-of-
service and charging. Security issues in-
cluding privacy, trust and identity man-
agement are central for this research
group. .
10 NordSecMob
11. s The Royal Institute of Technology – KTH
KTH was founded in 1827
and is the largest of
Sweden's universities of
technology. It consists of
nine schools with over
11,000 undergraduate
students, 1,500 active
postgraduate students and a staff of 3,100
people. There are four campuses with the
main campus in central Stockholm. The
KTH part of the programme is organised
under the KTH School of ICT.
integration of IP and optics, as well as
The ICT school of KTH conducts research
architectures for network systems with
on communication systems, including
particular focus on decentralized, modu-
their use, policy and regulation of com-
larized approaches to network system
munication markets, design and imple-
design. Security aspects related to distrib-
mentation of applications, services and
uted service architectures, proxy systems,
network systems. In the area of commu-
and secure voice over IP communication
nication systems design, the main re-
are important areas of research. .
search topics are network architectures
and protocols for the future Internet, the
The Norwegian University of Science and Technology – NTNU
of Norway. The Department of Telematics
NTNU was established in 1996 as a further
ITEM is responsible for the teaching of
development of the University of Trond-
the courses in the NordSecMob-prog-
heim (UNiT). NTNU has seven faculties
ramme at NTNU.
and the faculty of Information Technology,
Mathematics and
Electrical Engi- The Department of
neering has six de- Telematics focuses
partments. There its information se-
are 20,000 students, curity research on
half of these study- two main topics:
ing technology or the natural sciences Security as a pivotal ingredient of Quanti-
and a staff of 3,300 of which over half in tative Quality of Service and cryptographic
academic or scientific positions. NTNU is protocols. Modelling, design, analysis and
located in Trondheim, on the western coast evaluation of information security for ICT
11
NordSecMob
12. Photo: NTNU Info/Rune Petter Ness
systems, services and protocols have in tographic functions for securing distribut-
the past most frequently been performed ed computerized communication systems,
by using qualitative principles, methods their goals being to restrict, establish and
and measures. However, in the present preserve the security properties of infor-
transition into an end user environment mation. A specific long-standing inquiry
dominated by ubiquitous computing power in the field of crypto-protocols is that of
and service realization, the information defining and constructing information pri-
security research needs to be focused on vacy, for instance in digital cash and e-
the quantitative aspects of description and voting schemes. Digital Tracks is another
negotiation of perceived QoS. Crypto- research activity which addresses both
graphic Protocols can be considered as privacy and forensic concerns.
distributed algorithms that employ cryp-
Technical University of Denmark – DTU
ence and Engineering section at the Infor-
DTU was originally founded
matics and Mathematical Modelling de-
as the College of Advanced
partment at DTU is responsible for the
Technology in 1829. DTU has
teaching of the programme. The teaching
a high international stan-
in safe and secure IT-systems is an estab-
dard within the technical-
lished part of DTU's engineering curricu-
natural sciences, based on
lum and supported by active research at
15 individual departments as well as a
the department.
number of research centers on campus
in Kongens Lyngby, the Copenhagen Met-
ropolitan area. The University has approx- In the DTU NordSecMob-programme there
imately 900 researchers, 6,000 students are two main research components. One
and 600 PhD students. The Computer Sci- deals with software security and focuses
12 NordSecMob
13. on techniques that can be used to validate
designs of systems for the absence of
security flaws and to develop systems that
can be relied upon to adhere to given se-
curity policies. To be specific, research on
communication protocols using static
analysis, originally developed in the EU-
project DEGAS, has successfully used to
validate a number of voting and single-
sign on protocols; research on access
Photo: Bo Jarner
control and information flow, including
the Decentralised Label Model, gives con-
crete techniques for constructing software
systems where code is guaranteed to
are likely to give users privacy and ano-
satisfy given confidentiality, integrity or
nymity; another focus is the study of in-
authenticity properties. Another deals with
trusion detection systems and how they
system security and network security. One
can best be configured to protect the user.
focus is on how to construct systems that
University of Tartu – UT
UT was originally founded as Academia clinics. The total number of students is
Dorpatensis (Gustaviana) in 1632 and it over 18,000, with a teaching staff of 1,300.
was reopened in 1802. UT has 11 faculties, UT is located in Tartu, in the southeast
3 research institutes and 6 colleges with part of Estonia. The responsibility of the
more than 70 departments, institutes and teaching of the programme at University
of Tartu is on the Institute of Computer
Science of the Department of Mathematics
and Computer Science.
The main NordSecMob-related research
areas in Tartu University are data security
and cryptography. The interests of our
working group reach from practical secu-
rity analysis to foundations of cryptograph-
ic primitives. The main research topics
are the following: security models based
on attack trees, economics of security,
privacy preserving data mining, formal
proof systems for cryptographic protocols
and properties of hash functions and ap-
plications of hash functions in digital time-
stamping.
13
NordSecMob
14. NordSecMob
Admission Requirements cate. Either a TOEFL or IELTS test is ac-
cepted, with the following minimum total
scores:
The NordSecMob-programme is targeted
for top-quality students of all nationalities.
TOEFL minimum scores are 580 (PBT),
237 (CBT) and 92 (iBT).
The admission criteria to the programme
is a high quality Bachelor's degree en-
compassing a minimum of 180 ECTS IELTS minimum score is 6,5
credits in Engineering (Computer Science
or Information technology) or equivalent For details, check NordSecMob-website.
studies, i.e., must be a degree of at least http://nordsecmob.tkk.fi
three years of full-time studies.
The applicants should
have solid knowledge of
mathematics (discrete
m a t h e m a t i c s ) , p ro -
gramming skills, data
structures and algo-
rithms, computer archi-
tecture and basics of
computer networks. In
addition, a basic knowl-
edge of following subject
areas will be an advan-
tage: databases and da-
tabase management,
principles of theoretical computer sci-
Application deadline and
ence, logic in computer science, software
selection criteria
engineering, operating systems, and con-
current programming.
The annual application deadline is the
beginning of January. Details of required
The language of instruction of the Nord-
application documents and the on-line
SecMob-programme is English. Thus,
application form are on the NordSecMob-
applicants must have a good command
website. Admission to the programme is
of English and most applicants must
granted on a competitive basis.
present an official language test certifi-
14 NordSecMob
15. Scholarships for Students and Staff
Erasmus Mundus-scholarships The amount of an average three-month
scholarship for scholars is 13,000 Euro.
for Non-European students
This includes three monthly grants of
4,000 Euro and a fixed amount of 1,000
Non-European students can apply for
Euro for travel expenses.
generous EU-funded Erasmus Mun-
dus scholarships. Eligible for the Er-
Nordplus-scholarships for all
asmus Mundus scholarships are stu-
dents who are NOT nationals of the EU
nationalities
member states, the EEA-states nor
nationals of the candidate countries The selected NordSecMob-students
for accession to the EU. Furthermore, can apply for Nordplus-scholar-
eligible students may not be residents ships for the mobility period (max 10
of the EU/EEA/candidate countries, months) to the host university. All na-
nor may they have carried out their tionalities can apply for the Nordplus-
main activities (study, work, etc) for scholarships.
more than a total of 12 months over
the last five years in the EU/EEA/can- Erasmus-scholarships for
didate countries. These scholarships
European students
are awarded to the best students on a
competitive basis. The European students selected to
NordSecMob-programme can apply
The Erasmus Mundus scholarship to- for Erasmus-scholarships for the mo-
tals 21,000 Euro per academic year. bility period to the host university.
This includes 10 monthly grants of
1,600 Euro and a fixed amount of 5,000
NordSecMob-consortium
Euro for fees, travel expenses, reloca-
scholarships for EU/EEA
tion costs, etc. For NordSecMob-pro-
citizens
gramme lasting two years the student
receives 42,000 Euro.
The NordSecMob-consortium offers
scholarships for excellent EU/EEA citi-
Erasmus Mundus scholarships zens. For details, check NordSecMob-
for Non-European scholars website http://nordsecmob.tkk.fi
A scholar is an academic and/or pro-
Programme fee
fessional of outstanding experience
who carries out teaching or research There is no programme fee for
assignments and scholarly work in the EU/EEA students. The programme
institutions participating in the Nord- fee is charged from any other than EU
SecMob-programme. Erasmus Mun- member state and EEA nationals. The
dus scholarships allow Non-European programme fee is announced on the
scholars to perform the tasks defined NordSecMob-website.
by the consortium for a maximum of
three months.
15
NordSecMob
16. Helsinki University
of Technology
http://www.tkk.fi/
The Royal Institute
of Technology
http://www.kth.se/
Photo: Vadim Makarov www.vad1.com
The Norwegian
University of Science
and Technology
http://www.ntnu.no/
Contact Information
NordSecMob Consortium
Technical University
Faculty of Information
Photo: Bo Jarner
and Natural Sciences of Denmark
Helsinki University of Technology TKK
http://www.dtu.dk/
Coordinator Ms Eija Kujanpää
street Konemiehentie 2 (P.O. Box 5400)
02015 TKK, city: Espoo
Finland
email: nordsecmob@tkk.fi
tel: +358-9-451 4773
fax +358-9-451 3015 University of Tartu
http://nordsecmob.tkk.fi http://www.ut.ee/