Back to Modules
CS442

Data Security and Privacy

1 CreditsTerm 1

Description

This course introduces undergraduate students to fundamental access control techniques that are essential to ensure data security and privacy. The focus of this course is on (A) access control on mobile platforms, and (B) access control on cloud. The topics to be covered in the area of access control on mobile platforms include mobile platform security model, Android overview, SELinux, and SEAndroid. The topics to be covered in the area of access control on cloud include an overview from PKI to ABE, math foundation and IBE, fuzzy IBE, KP-ABE, and CP-ABE.

Requisites

Prerequisites: CS440 & IS112/IS105/CS105/ANLY104/IS217 - Pre-req

Co-requisites: None

Anti-requisites: None

Attributes

Department: SCIS

Course Level: Undergraduate

Tracks: CS/IS: Cybersecurity Track

Areas: Advanced Business Technology Major Business Options Econ Major Rel/Econ Options Grad Req - Dig Tech/Data Ana (Intake 2024 onwards) IS Depth Electives Social Sciences/PLE Major-related Technology & Entrepreneurship

Learning Outcomes

1. Explain data privacy and security risks in mobile, IoT, and cloud computing platforms, and Big data applications 2. Explain ethical principles and legislation concerning the collection, storage, and processing of Big data 3. Analyze data privacy and security risks in mobile and IoT apps using program analysis and test generation techniques 4. Apply adequate cryptographic techniques to protect confidentiality of data in mobile, IoT and cloud computing, and Big data applications 5. Apply adequate data anonymization techniques to protect data privacy 6. Apply adequate privacy preserving data mining techniques for clustering and classification of privacy- sensitive data

Graduate Learning Outcomes

Disciplinary Knowledge, Multidisciplinary Knowledge, Critical thinking & problem solving, Innovation and enterprising skills, Collaboration and leadership, Communication, Self-directed learning, Resilience

Competencies

Security Architecture, Security Assessment and Testing, Security Programme Management, Data Protection Management, Cyber and Data Breach Incident Management, Security Education and Awareness, Threat Analysis and Defence, Threat Intelligence and Detection