Security and Privacy
2nd Cycle Studies - Mestrado
BSc in Informatics Engineering or equivalent.
Lecture classes (T): presentation and discussion around the topics of the course.
Lab classes (PL): application of theoretical concepts in projects.
The MSI theoretical classes will take place, preferably, Friday afternoon and Saturday morning. Theoretical classes will also be broadcast by teleconference and will be recorded to allow the students to follow the classes remotely.
The practical classes will be preferably booked Friday morning. The practical assignments may also be developed by the students in remote and asynchronous mode with remote support of teachers.
The aim of this curricular unir is to provide knowledge on advanced models and techniques for security and privacy of data and communications. It is expected that students master the use of economic models to examine the cost-benefit tradeoff of information security, techniques for anonymization and assessment of the security level of anonymized data communications, as well as data mining methods for security and privacy, particularly when applied to intrusion detection and authentication systems. Beyond acquiring knowledge on the fundamentals of these areas, students are expected to gain competences in the analysis and validation of the presented security models and techniques through their application in real-world case studies.
- Economics of information security and privacy.
- Game theory.
- Economics of security investment.
- Cyber-insurance for security risk management.
- Economics of security and privacy vulnerability disclosure.
- Privacy and anonymity techniques.
- Privacy principles: k-anonymity, l-diversity, t-closeness.
- Data management – anonymization and de-anonymization.
- Anonymous networking: crowds, onion routing, ToR.
- Security and privacy aspects of social and mobile networks.
- Data processing and analysis for security and privacy.
- Intrusion detection systems.
- User authentication and biometrics.
- Experimental techniques in informatics security.
João Paulo da Silva Machado Garcia Vilela
Resolution Problems: 25.0%
- Lawrence Gordon and Martin Loeb, “Managing Cybersecurity Resources: A Cost-Benefit Analysis”, Mcgraw-Hill, 2005
- Ross Anderson, “Security Engineering”, Wiley, 2008
- Ross Anderson, Rainer Böhme, Richard Clayton, Tyler Moore, “Security Economics and the Internal Market”, ENISA, 2008
- Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies, “Security in Computing”, Prentice Hall, 2015
- Shimon K. Modi, “Biometrics in Identity Management: Concepts to Applications”, Artech House, 2011
- William Stallings, Lawrie Brown, “Computer Security: Principles and Practice”, Pearson, 2014
- Sumeet Dua,Xian Du, “Data Mining and Machine Learning in Cybersecurity”, CRC Press, 2011.