COMP522

Privacy And Security

Aims

The aims of this module are: to introduce students to the major problems and solution approaches in the area of computer and Internet privacy, confidentiality and security. to provide a theoretical framework for subsequent research in these challenging areas.

Syllabus

Identification and authentication:
-passwords v. tokens v. biometrics
-identity v. capability
-data aggregation, anonymity and pseudoanonymity
-steganography.

Recommended Texts

Reading lists are managed at readinglists.liverpool.ac.uk. Click here to access the reading lists for this module.

Learning Outcomes

(LO1) At the end of the module, students should understand the main problems in security, confidentiality and privacy in conputers and in networks, and the reasons for their importance.


(LO2) At the end of the module, students should understand the main approaches adopted for their solution and/or mitigation, together with the strengths and weaknesses of each of these approaches


(LO3) At the end of the module, students should understand the main encryption algorithms and protocols


(LO4) At the end of the module, students should appreciate the application of encryption algorithms to secure messaging, key distribution and exchange, authentication and electronic payment systems


(LO5) At the end of the module, students should understand the use of epistemic logics for formal modeling of security and privacy protocols.


(LO6) At the end of the module, students should understand the legal and ethical issues related to securit, confidentiality and privacy.


(S1) Adaptability


(S2) Problem solving skills


(S3) Numeracy


(S4) IT skills


(S5) Commercial awareness


(S6) Ethical awareness


(S7) Lifelong learning skills

Learning Strategy

Teaching Method 1 - Lecture Description: Lectures Teaching Method 2 - Practical Description: Computer labs