DESIGN OF SECURE SYSTEMS

DESCRIPTION

As the pursuit of privacy protection increasingly requires knowhow in digital technologies, this module provides students with an understanding of the technical elements required for auditing a technological system, ensuring anonymity, protecting stored data, and cryptographical operations such as encryption and re-identification. Looking ahead to the next module on impacts, this module includes material on how societal impact can be accounted for in the very design of technological systems.

CONTENTS

– Technological audit: software, hardware and networks

– Threat detection and modelling

– Cryptography, anonymity and re-identification

– Secure storage and authentication management

– Translating societal concerns into technological solutions

 

ECTS: 5

 

BIBLIOGRAPHY

Martino, J.P. (1994) A technology audit: key to technology planning. Proceedings of the 1994 National Aerospace and Electronics Conference, vol.2: 1241 – 1247.

Larsson, S. and Svensson, M. (2010) Compliance or Obscurity? Online Anonymity as a Consequence of Fighting Unauthorised File-sharing. Policy & Internet 2(4): 77-105.

Schermer B.W. (2011) The limits of privacy in automated profiling and data mining. Computer Law & Security Review 27(1)

Hart, J. (2013) Why the traditional approach to information security is no longer working. Network Security 2013(1): 12-14.

 

 

 

BACK TO MODULES