Data Security and Privacy

CS 652

Lecturer:  Prof. Dr. Frederik Armknecht
Teaching Assistant: Youzhe Heng

Nowadays, users are more and more revealing data to the outside – either willingly as in the context of cloud computing or possibly unconsciously as in the case of the Internet of Things. The aim of this lecture is to raise awareness by showing various security threats, e.g., traces left in the Internet, but also possible countermeasures, e.g., anonymization of data or the use of dedicated encryption schemes.

  • Lecture and Exercise

    See Portal2

  • Learning Goals

    Expertise

    Students will acquire the knowledge to identify security threats and to select and use appropriate countermeasures.

    Methodological competence

    Successful participants will be able to understand state-of-the-art methods of IT-security and cryptography, as well as being able to select, apply, and evaluate the most appropriate techniques for a variety of different security-sensitive scenarios. In particular they are able to realize possible risks in new scenarios and to transfer given solutions to these.

    Personal competence

    The analytic, concentrated, and precise thinking of the students is trained. By the independent treatment of applications, e.g. in the course of the ex-ercises, their abstraction capacity is further developed and the transfer of the learned material to related questions is trained.

  • Prerequisites

    There are no formal prerequisites but knowledge in cryptography or IT-security is recommended, e.g., by attending the lectures “Cryptography I” or “Selected Topics in IT-Security”.