Security

Learning results (shared with Criptography):

  1. Protect applications and data by defining and applying security criteria in the access, storage and transmission of information.

We will talk about logical security (software) and active security (preventive) associated with software development.

A system can be considered secure if we take care of the following aspects, from most to least significant:

  • Availability: Users can access information when they need it.
  • Confidentiality: Information is accessible only to those authorized to have access.
  • Integrity: keep data free from unauthorized modification.
  • Authentication: identity verification.
  • Non-repudiation: Neither the sender nor the receiver can deny being a party to the communication that occurs.

Within the programming, and with reference to security, we will talk about the following aspects:

  • Access control: registration, authentication and authorization of users.
  • Secure design of software to avoid vulnerabilities.

References

Security:

Authentication / authorization: