Skip to main content
Délia Boino
Submitted by dboino on 21 March 2021
Intended learning outcomes

Students who successfully complete this course unit should be able to:

  1. List the different mechanisms for information protection and main objectives (confidentiality, data integrity) and problems (key space size, key generation) of modern cryptography.
  2. Describe some of the key application areas of number theory, such as public key encryption, block ciphers and hash functions, and blockchain infrastructures.
  3. Identify existing vulnerabilities in the software and use techniques appropriate to their mitigation or correction
  4. Explain the cryptographic mechanisms available on modern hardware platforms.
  5. Identify different systems for detecting and preventing security breaches.
  6. Identify the different existing regulatory frameworks.
  7. Conduct a risk analysis and definition of threats.

 

Curricular Unit Form