(*)- Understand the most important, high-level aspects of security in IT systems and networks and how they interact (K5)
- Know the correct terminology to communicate with other experts (K4)
- Understand the difference between technical and organizational security aspects and when each are appropriate (K5)
- Understand different technical security methods and how they can be applied to practical problems (K6), including cryptography (K4), user authentication (K5), secure coding (K2), access control models (K5), and network security architectures (K4)
- Position security requirements with regards to the wider system context and balance with others such as usability, privacy, or safety (K5)
|
(*)- Threat scenarios and models
- Risks analysis
- Organizational security processes
- Basic concepts of cryptography and classification of cryptographic primitives
- Identification and authentication methods
- Access control models and operating systems
- Network and protocol security
- Code security
- Usability of security methods
- Privacy concerns
|