CY 487 Data Security *

The course focuses on the protection of data at rest, during processing, and in transit. This course requires the application of mathematical and analytical algorithms to fully implement. Students completing this course will have an understanding of basic cryptography concepts, digital forensics, end-to-end secure communications, data integrity and authentication, and information storage security.

Credits

5

Prerequisite

For students to succeed in this course, IS 360 and IS 345 are required pre-requisites.

Outcomes

  1. As a result of this course students will acquire course outcomes and demonstrate them through their assignments:
  2. 1. Explain the core principles and concepts of data security, including the CIA triad (confidentiality, integrity, availability).
  3. 2. Manage symmetric and asymmetric encryption methods to protect sensitive data.
  4. 3. Acquire practical experience using data security tools and techniques simulating real-world data security challenges.
  5. 4. Respond to potential data threats, implement preventative measures, and effectively address data breaches to minimize impact.
  6. 5. Evaluate the requirements of major data protection laws and regulations (e.g., GDPR, HIPAA) with corresponding compliance measures.
  7. 6. Create access control strategies with embedded evaluation benchmarks to ensure that only authorized individuals can access specific data.