Principles of secure software design  

Description: Topics covered by the course include: security risk management, security modelling languages and models, security threats and security requirements, security controls (role-based access control, introduction to cryptography), secure software processes, security patterns, social engineering, real-life security applications (e.g., i-voting, xRoad, e-examination). Learning outcomes: On successful completion of this course, students will able to: 1. Identify causes and consequences of (lack of) system and software security. 2. Master essential techniques to reduce and avoid system and software security problems, to introduce and reason on security requirements and controls. 3. Apply advanced modelling techniques (notations, tools, and processes) to build secure systems and software.
Presential
English
Principles of secure software design
English

Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or HaDEA. Neither the European Union nor the granting authority can be held responsible for them. The statements made herein do not necessarily have the consent or agreement of the ASTRAIOS Consortium. These represent the opinion and findings of the author(s).