Data Security

Objectives

  • Understand how the properties of confidentiality, integrity, availability, authenticity, and non-repudiation affect information security requirements in different computer systems and application contexts;
  • Understand the main threats and attacks on stored data and data in transit;
  • Understand the appropriate levels of authentication, authorisation, and access control to guarantee data integrity, confidentiality and privacy;
  • Use cryptographic protocols appropriate to the different scenarios and security requirements of computer systems;
  • Apply techniques for security applied to the storage of sensitive data, e.g., cryptographic hashing functions, password-based key derivation and password management;
  • Understand the levels of data protection provided by computer network security protocols.

Program

  • Concepts and fundamentals of data security
  • Security properties, threats, attacks, vulnerabilities, risk, and security models
  • Symmetric cryptography
  • Sequential ciphers, Block ciphers, One-way functions, Message authentication
  • Asymmetric cryptography
  • Public key ciphers, Key agreement, Digital signatures, Public key certificates, Post-quantum cryptography
  • Cryptographic protocols applied to data in transit
  • Data privacy

Bibliography

  • W. Stallings, L. Brown. Computer Security: Principles and Practice. 4th Edition, Pearson, 2018.
  • M. Whitman, H. Mattord. Principles of Information Security. 7th Edition, Cengage, 2021.
  • W. Du. Computer Security: A Hands-on Approach. 3rd Edition, CreateSpace, 2022.
  • W. Stallings. Cryptography and Network Security: Principles and Practice. 8th Edition, Pearson, 2022.
  • D. Wong. Real-World Cryptography. Manning, 2021.

Updated: