Skip to main content
Délia Boino
Submitted by dboino on 8 March 2021
Intended learning outcomes
  1. Understand the main threats to the security of computer systems.
  2. Understand, choose and use cryptographic mechanisms and protocols, including the key management issues.
  3. Understand, choose and use authorization and access control models and mechanisms.
  4. Identity vulnerabilities in software systems and use adequate protection measures.


Curricular Unit Form