Intended learning outcomes
- Understand the main threats to the security of computer systems.
- Understand, choose and use cryptographic mechanisms and protocols, including the key management issues.
- Understand, choose and use authorization and access control models and mechanisms.
- Identity vulnerabilities in software systems and use adequate protection measures.