Educational guide | ||||||||||||||||||||||||||||||||||||||||
IDENTIFYING DATA | 2023_24 | |||||||||||||||||||||||||||||||||||||||
Subject | TRENDS IN DATA SECURITY | Code | 01742013 | |||||||||||||||||||||||||||||||||||||
Study programme |
|
|||||||||||||||||||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||||||||||||||||||||
3 | Compulsory | First | First |
|||||||||||||||||||||||||||||||||||||
Language |
|
|||||||||||||||||||||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||||||||||||||||||||
Department | MATEMATICAS |
|||||||||||||||||||||||||||||||||||||||
Coordinador |
|
asuac@unileon.es amunc@unileon.es |
||||||||||||||||||||||||||||||||||||||
Lecturers |
|
|||||||||||||||||||||||||||||||||||||||
Web | http:// | |||||||||||||||||||||||||||||||||||||||
General description | ||||||||||||||||||||||||||||||||||||||||
Tribunales de RevisiĆ³n |
|
|||||||||||||||||||||||||||||||||||||||
Competencies |
Type A | Code | Competences Specific |
A17957 | ||
Type B | Code | Competences Transversal |
Type C | Code | Competences Nuclear |
C1 | ||
C2 | ||
C3 | ||
C4 | ||
C5 |
Learning aims |
Competences | |||
A17957 |
|||
A17957 |
|||
A17957 |
|||
C1 C2 C3 C4 C5 |
Contents |
Topic | Sub-topic |
Privacy and security in Big Data | |
Privacy in the generation, storage and processing of data | |
Measures and techniques to preseserve privacy and its limitations when applied to Big Data |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
Assignments | 0 | 40 | 40 | ||||||
Presentations / expositions | 5 | 0 | 5 | ||||||
Personal tuition | 0 | 2 | 2 | ||||||
Forums of discussion | 0 | 3 | 3 | ||||||
Tutorship of group | 6 | 0 | 6 | ||||||
Lecture | 0 | 14 | 14 | ||||||
Mixed tests | 0 | 5 | 5 | ||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
Assignments | |
Presentations / expositions | |
Personal tuition | |
Forums of discussion | |
Tutorship of group | |
Lecture |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Assignments | 60% | ||
Forums of discussion | 10% | ||
Mixed tests | 30% | ||
Other comments and second call | |||
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic |
Colin Tankard, Big data security, , Network Security 7 (2012) Fei Hu, Big Data: Storage, Sharing, and Security, CRC, |
Complementary |
Choo, Kim-Kwang Raymond, Dehghantanha, Ali (Eds.), Handbook of Big Data Privacy, Springer, |
Recommendations |