Data Security

Objectives

  • Understand how the properties of confidentiality, integrity, availability, authenticity, and non-repudiation affect information security requirements in different computer systems and application contexts;
  • Understand the main threats and attacks on stored data and data in transit;
  • Understand the appropriate levels of authentication, authorization, and access control to guarantee data integrity, confidentiality and privacy; 
  • Use cryptographic protocols appropriate to the different scenarios and security requirements of computer systems;
  • Apply techniques for security applied to the storage of sensitive data, e.g., cryptographic hashing functions, password-based key derivation and password management;
  • Understand the levels of data protection provided by computer network security protocols.

Program

  1. Concepts and fundamentals of data security Security properties, threats, attacks, vulnerabilities, risk, and security models
  2. Symmetric cryptography Sequential ciphers, Block ciphers, One-way functions, Message authentication 
  3. Asymmetric cryptography Public key ciphers, Key agreement, Digital signatures, Public key certificates, Post-quantum cryptography
  4. Cryptographic protocols applied to data in transit
  5. Data privacy

Bibliography

  • Stallings, W. and Brown, L. Computer Security: Principles and Practice (4th Edition), Pearson 2018;
  • Whitman, M. and Mattord, H. Principles of Information Security (7th Edition), Cengage 2021;
  • Du, W. Computer Security: A Hands-on Approach (3rd Edition), 2022;
  • Stallings, W. Cryptography and Network Security: Principles and Practice (8th Edition), Pearson 2022;
  • Wong, D. Real-World Cryptography, Manning 2021.

Updated: