Checking date: 06/05/2025 19:23:03


Course: 2025/2026

Data protection & cybersecurity
(16495)
Bachelor in Data Science and Engineering (Study Plan 2018) (Plan: 392 - Estudio: 350)


Coordinating teacher: MOURE GARRIDO, MARTA

Department assigned to the subject: Telematic Engineering Department

Type: Compulsory
ECTS Credits: 6.0 ECTS

Course:
Semester:




Objectives
· Knowledge and understanding of the fundamentals of data protection and the principles of cybersecurity as applied to the data lifecycle within the field of data science. · Ability to apply cryptographic techniques both symmetric and asymmetric including hash functions and digital signatures, to ensure the confidentiality, integrity, and authenticity of data. · Capacity to analyze vulnerabilities, threats, and attacks in systems and networks, and to design and implement appropriate defense, detection, and response measures. · Understanding of the legal and regulatory frameworks related to data protection (including the General Data Protection Regulation, GDPR), and ability to apply them in practice.
Description of contents: programme
1. Introduction to Cybersecurity 2. Principles of Data Protection 3. Privacy in Big Data 4. Security management and government 5. Legal aspects of data protection
Learning activities and methodology
AF1: THEORETICAL-PRACTICAL CLASSES. They will present the knowledge that students should acquire. They will receive the class notes and will have basic reference documents to facilitate the follow-up of the classes and the development of the subsequent work. Exercises and problems that students may have, will be solved and workshops and evaluation tests will be carried out to develope the necessary skills. AF2: TUTORING SESSIONS. Individualized attendance (individual tutoring) or in-group (group tutoring) for students with a teacher. AF3: STUDENT INDIVIDUAL WORK OR GROUP WORK. AF8: WORKSHOPS AND LABORATORY SESSIONS. AF9: FINAL EXAM. Global assessment of knowledge, skills and capacities acquired throughout the course. MD1: THEORY CLASS. Classroom presentations by the teacher with IT and audiovisual support in which the subject`s main concepts are developed, while providing material and bibliography to complement student learning MD2: PRACTICAL CLASS. Resolution of practical cases, problems, etc. raised by the teacher individually or in groups. MD3: TUTORING SESSIONS. Individualized attendance (individual tutoring sessions) or in-group (group tutoring sessions) for students with teacher as tutor. MD6: LABORATORY PRACTICES. Applied / experimental teaching to workshops and laboratories under the supervision of a tutor.
Assessment System
  • % end-of-term-examination/test 30
  • % of continuous assessment (assigments, laboratory, practicals...) 70

Calendar of Continuous assessment


Extraordinary call: regulations
Basic Bibliography
  • Alfred J. Menezes , Jonathan Katz , Paul C. van Oorschot , Scott A. Vanstone . Handbook of Applied Cryptography (Discrete Mathematics and Its Applications). CRC Press. 1996
  • Josep Domingo-Ferrer, David Sánchez, Jordi Soria-Comas. Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections. Morgan & Claypool Publishers . 2017
  • Seth James Nielson, Christopher K. Monson. Practical Cryptography in Python: Learning Correct Cryptography by Example. Apress. 2019
  • William Stallings. Cryptography and Network Security: Principles and Practice. Pearson. 2023
Recursos electrónicosElectronic Resources *
Additional Bibliography
  • Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner. Network Security: Private Communications in a Public World. Pearson. 2022
  • David Wong. Real-World Cryptography. Manning. 2021
Recursos electrónicosElectronic Resources *
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN


The course syllabus may change due academic events or other reasons.