Trusted and Secure Software Development
ALEXOPOULOS NIKOLAOS
Developers are usually trained so that when they develop computing systems, they need to have the necessary functionality in mind without taking account of security. This results in many systems containing weaknesses that can exploit malicious users with particularly damaging consequences either: (a) for organizations that have these systems, and (b) for their users.
Students who will attend this lesson will first understand all the basic definitions of computer security. In addition, they will be able to directly recognize the weaknesses of a vulnerable system and will be able to recognize ways in which they can protect it. Finally, you will learn the most modern techniques for developing secure software, cryptographic protocols, and more generally everything you need to develop a reliable and secure system.