401 – Personal data protection
Mykola Onai
Annotation

Introduction to privacy protection. General Data Protection Regulation. Privacy laws, regulations, and public policy. Foundational concepts of information security and privacy exploring information value. Classifications of threats to personal data. Digital footprint: definition, examples, and ways to reduce. Recommendation of privacy and security settings for software applications. Biometrics as data security. Technical aspects of information protection. Classification of cryptographic systems. Encryption key. Fields of application of cryptography. User identification. Password storage methods. Examples of simplest ciphers: are Caesar's Cipher and Generalized Caesar Cipher. Symmetric and asymmetric systems of cryptographic protection of information. Features of their use. Key exchange according to the Diffie-Hellman scheme and the RSA algorithm. The AES and its features (correct settings in applications). NIST competition. Requirements for the new algorithm. A system for checking the implementation of the algorithm for compliance with the standard. Digital Signature Standard (DSS) and El-Gamal scheme in digital signature mode.

Objectives

Cybersecurity awareness, Communication, Critical thinking, Understanding privacy settings, Adaptability

Keywords
GDPR, Security Settings, Encryption, Digital Footprint, Cipher, AES, DSS.
Date of Creation
23. 08. 2024
Duration
30 hours.
Language
English
License
ISBN
Literature
  1. Wenbo Mao Modern Cryptography: Theory and Practice ‏ : ‎ Pearson PTR; 1st edition
  1. Jean-Philippe Aumasson Serious Cryptography: A Practical Introduction to Modern Encryption ‏ : ‎ No Starch Press (November 6, 2017)
  1. Thomas R. Shemanske Modern Cryptography and Elliptic Curves: A Beginner's Guide : ‎ American Mathematical Society
  1. Niels Ferguson, Bruce Schneier, Tadayoshi Kohno Cryptography Engineering: Design Principles and Practical Applications Wiley; 1st edition
  1. Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman (Author) An Introduction to Mathematical Cryptography Springer; Softcover reprint of hardcover 1st ed. 2008 edition
  1. Seth James Nielson, Christopher K. Monson Practical Cryptography in Python: Learning Correct Cryptography by Example Apress; 1st ed. Edition
  1. Lawrence C. Washington Elliptic Curves: Number Theory and Cryptography Chapman and Hall/CRC; 2nd edition
  1. General Data Protection Regulation (EU GDPR), https://gdpr-text.com/
  1. Advanced Encryption Standard (AES), https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197-upd1.pdf
  1. https://uscode.house.gov/view.xhtml?req=granuleid%3AUSC-prelim-title15-section6821&edition=prelim
  1. https://uscode.house.gov/view.xhtml?req=granuleid%3AUSC-prelim-title15-section6801&edition=prelim
  1. Health Insurance Portability and Accountability Act of 1996, https://www.congress.gov/bill/104th-congress/house-bill/3103/text
  1. https://www.law.cornell.edu/uscode/text/15/chapter-91
  1. Personal Information Protection and Electronic Documents Act (S.C. 2000, c. 5), https://laws-lois.justice.gc.ca/eng/acts/p-8.6/
  1. https://www.legislation.gov.au/C2004A03712/latest/text
  1. Notifiable Data Breaches scheme, https://www.oaic.gov.au/privacy/notifiable-data-breaches/about-the-notifiable-data-breaches-scheme
  1. Office of the Australian Information Commissioner (OAIC), https://www.oaic.gov.au/
  1. Act on the Protection of Personal Information (APPI), https://www.japaneselawtranslation.go.jp/en/laws/view/4241/en
  1. https://www.europarl.europa.eu/meetdocs/2014_2019/plmrep/COMMITTEES/LIBE/DV/2018/09-10/Convention_108_EN.pdf