Cryptography Algorithms and Security of Information Systems (ΠΛ7): Διαφορά μεταξύ των αναθεωρήσεων

Από Wiki Τμήματος Μαθηματικών
Γραμμή 49: Γραμμή 49:
! Learning outcomes
! Learning outcomes
|
|
ΧΧΧ
Upon completion of this course postgraduate students:
* They will understand the fundamental concepts in the security of information systems and networks
* They will be able to identify vulnerabilities, program-level and service-level threats, and system and network-level risk assessments, and apply methodologies for identifying and addressing such risks
* They will be able to describe basic access control models and policies and be able to develop an appropriate security policy and the necessary protection mechanisms that will support it over an information system
They will be able to develop cryptographic algorithms and implement encryption methods over a networking environment, to develop secure service mechanisms and algorithms using programming languages such as C / C ++ and libraries such as Libgcrypt and Libmcrypt.
* They will know the basic security features of network and network applications, methods of attacking (local-remote) and distinguish their criticality.
They will be able to distinguish the basic vulnerabilities of Web and application service systems, especially SQL-injection attacks and buffer overflows, and develop appropriate defensive mechanisms.
* They will understand security concepts and technologies. They will have the ability to analyze the risk and synthesis of policies and technologies within an integrated IT security plan.
|-
|-
! General Competences
! General Competences
|
|
ΧΧΧ
* Development and explanation of theoretical modules, presentation of specific case studies, analysis and evaluation of representative security technologies, security methods and algorithms for authentication, integrity and data encryption
* Developing secure software applications and services
* Making decisions, addressing real security and privacy issues
* Strategic planning and implementation – Embellishment
* Autonomous Work
|}
|}



Αναθεώρηση της 20:10, 10 Νοεμβρίου 2022

Graduate Courses Outlines - Department of Mathematics

General

School School of Science
Academic Unit Department of Mathematics
Level of Studies Graduate
Course Code ΠΛ7
Semester 2
Course Title Cryptography Algorithms and Security of Information Systems
Independent Teaching Activities Lectures (Weekly Teaching Hours: 3, Credits: 7.5)
Course Type Specialized general knowledge
Prerequisite Courses -
Language of Instruction and Examinations

Greek

Is the Course Offered to Erasmus Students Yes (in English)
Course Website (URL) See eCourse, the Learning Management System maintained by the University of Ioannina.

Learning Outcomes

Learning outcomes

Upon completion of this course postgraduate students:

  • They will understand the fundamental concepts in the security of information systems and networks
  • They will be able to identify vulnerabilities, program-level and service-level threats, and system and network-level risk assessments, and apply methodologies for identifying and addressing such risks
  • They will be able to describe basic access control models and policies and be able to develop an appropriate security policy and the necessary protection mechanisms that will support it over an information system

They will be able to develop cryptographic algorithms and implement encryption methods over a networking environment, to develop secure service mechanisms and algorithms using programming languages such as C / C ++ and libraries such as Libgcrypt and Libmcrypt.

  • They will know the basic security features of network and network applications, methods of attacking (local-remote) and distinguish their criticality.

They will be able to distinguish the basic vulnerabilities of Web and application service systems, especially SQL-injection attacks and buffer overflows, and develop appropriate defensive mechanisms.

  • They will understand security concepts and technologies. They will have the ability to analyze the risk and synthesis of policies and technologies within an integrated IT security plan.
General Competences
  • Development and explanation of theoretical modules, presentation of specific case studies, analysis and evaluation of representative security technologies, security methods and algorithms for authentication, integrity and data encryption
  • Developing secure software applications and services
  • Making decisions, addressing real security and privacy issues
  • Strategic planning and implementation – Embellishment
  • Autonomous Work

Syllabus

ΧΧΧ

Teaching and Learning Methods - Evaluation

Delivery

ΧΧΧ

Use of Information and Communications Technology

ΧΧΧ

Teaching Methods
Activity Semester Workload
Lectures 39
ΧΧΧ 000
ΧΧΧ 000
Course total 187.5
Student Performance Evaluation

ΧΧΧ

Attached Bibliography

Πρότυπο:MAM199-Biblio