Privacy and security in data science and AI

Course info:

Semester: 5

General Foundation

ECTS: 6

Hours per week: 3

Professor: T.B.D.

Teaching style: Face to face

Grading: Written exams (50%), Essays / Projects (50%)

Activity Workload
Lectures 26
Tutorials 13
Essays / Project 60
Independent study 51
Course total 150

Learning Results

The course covers emerging issues and topics of Security and Privacy in the scientific areas of Data Science and Artificial Intelligence (AI). The aim of the course is to create a framework of theoretical and technical knowledge, by identifying vulnerabilities and associated risks, exploring appropriate security mechanisms and techniques to mitigate attacks and threats, and studying specific aspects related to AI and Data Science that generate security and privacy concerns.

Upon successful completion of this course, the student will be:

  • Aware of security issues and concerns in Data Science and AI.
  • Recognise the vulnerabilities of systems that incorporate AI and Data Science.
  • Able to apply common security policy design principles.
  • Aware of the features and security mechanisms that implement these policies.
  • Realise the implementation and application of security mechanisms in different Dependable Systems and Critical Infrastructures.
  • Design and evaluate secure architectures that incorporate with AI systems.
  • Have knowledge of Database Security.
  • Know how to use applied Data Science and Machine Learning techniques for Cyber Security.
  • Know authentication mechanisms, their role and importance in AI systems.
  • Familiar with cryptography required to preserve privacy and authenticity.
  • Understand Intrusion Detection Systems, their operation and the detection techniques used in them.

Skills acquired

  • Retrieve, analyse and synthesise data and information by utilising necessary technologies
  • Decision-Making
  • Work independently / Teamwork
  • Project planning and management
  • Work in an international environment
  • Work in an interdisciplinary environment
  • Dependable Systems and Critical Infrastructures
  • Secure Big Data Applications for Cloud/Edge/Fog Computing and Future Internet
  • Security Architecture Design
  • Social- (human) and technical- (digital) vulnerabilities in the data security space
  • Ethical boundaries of hacking and its applications
  • Ethical Hacking sophisticated techniques
  • Big Data Security and Privacy
  • Secure Authentication Schemes
  • Data Encryption and Decryption Techniques
  • Deep Learning methods for Intrusion Detection
  • Privacy-aware digital forensics
  • Security Governance
  • Legal, Ethical and Regulatory Issues of Security and Privacy
  • Security Economics
  • Sikos, L. and Choo, K. (eds.) “Data Science in Cybersecurity and Cyberthreat Intelligence”. Cham: Springer Nature, 2020.
  • Choo, K. and Dehghantanha, A. (eds.) “Handbook of Big Data Privacy”. Cham: Springer Nature, 2020.
  • Ren, W., Wang, L., Choo, K. and Xhafa, F., (eds.) “Security and Privacy for Big Data, Cloud Computing and Applications”. London: Institution of Engineering and Technology (IET), 2019.
  • Witzleb, N., Paterson, M. and Richardson, J., (eds.). “Big Data, Political Campaigning and the Law”. London: Routledge, 2020.
  • Bishop M., “Computer Security: Art and Science”, Addison-Wesley, 2015.
  • Pfleeger C.P., Shari Lawrence Pfleeger, Jonathan Margulles, “Security in Computing”, Pearson, 2015.
  • Buchmann J., “Introduction to Cyptography”, 2nd Ed., Springer, 2004.
  • Casey E., “Handbook of Computer Crime Investigation – Forensic Tools and Technology”, Academic Press, 2002.
  • Mitnick K.D., Simon W.L., “The Art of Deception”, John Wiley & Sons, 2002.
  • Pieprzyk J., Hardjono T., Seberry J., “Fundamentals of Computer Security”, Springer, 2003.
  • Schultz, E., “Incident Response: A Strategic Guide to Handling System and Network Security Breaches”, New Riders Publishing, 2002.
  • Spitzner L., “Honeypots – Tracking Hackers”, Addison Wisley, 2003.
  • Young S., Aitel D., “The Hacker’s Handbook – The Strategy behind Breaking into and Defending Networks”, Auerbach, 2004.

Related scientific journals:

  1. International Journal of Information Security, Springer
  2. Journal of Computer Security, IOS Press
  3. Cybersecurity, Springer
  4. Journal of Cyber Policy, Taylor & Francis

Internet sources:

  1. https://ec.europa.eu/info/law/law-topic/data-protection_en – Data Protection Topics (European Commission)
  2. https://www.enisa.europa.eu/ – European Union Agency for Cybersecurity
  3. http://www.nist.gov – National Institute of Standards and Technology (US)
  4. http://www.itu.int – International Telecommunication Union
Learning Results - Skills acquired

Learning Results

The course covers emerging issues and topics of Security and Privacy in the scientific areas of Data Science and Artificial Intelligence (AI). The aim of the course is to create a framework of theoretical and technical knowledge, by identifying vulnerabilities and associated risks, exploring appropriate security mechanisms and techniques to mitigate attacks and threats, and studying specific aspects related to AI and Data Science that generate security and privacy concerns.

Upon successful completion of this course, the student will be:

  • Aware of security issues and concerns in Data Science and AI.
  • Recognise the vulnerabilities of systems that incorporate AI and Data Science.
  • Able to apply common security policy design principles.
  • Aware of the features and security mechanisms that implement these policies.
  • Realise the implementation and application of security mechanisms in different Dependable Systems and Critical Infrastructures.
  • Design and evaluate secure architectures that incorporate with AI systems.
  • Have knowledge of Database Security.
  • Know how to use applied Data Science and Machine Learning techniques for Cyber Security.
  • Know authentication mechanisms, their role and importance in AI systems.
  • Familiar with cryptography required to preserve privacy and authenticity.
  • Understand Intrusion Detection Systems, their operation and the detection techniques used in them.

Skills acquired

  • Retrieve, analyse and synthesise data and information by utilising necessary technologies
  • Decision-Making
  • Work independently / Teamwork
  • Project planning and management
  • Work in an international environment
  • Work in an interdisciplinary environment
Course content
  • Dependable Systems and Critical Infrastructures
  • Secure Big Data Applications for Cloud/Edge/Fog Computing and Future Internet
  • Security Architecture Design
  • Social- (human) and technical- (digital) vulnerabilities in the data security space
  • Ethical boundaries of hacking and its applications
  • Ethical Hacking sophisticated techniques
  • Big Data Security and Privacy
  • Secure Authentication Schemes
  • Data Encryption and Decryption Techniques
  • Deep Learning methods for Intrusion Detection
  • Privacy-aware digital forensics
  • Security Governance
  • Legal, Ethical and Regulatory Issues of Security and Privacy
  • Security Economics
Recommended bibliography
  • Sikos, L. and Choo, K. (eds.) “Data Science in Cybersecurity and Cyberthreat Intelligence”. Cham: Springer Nature, 2020.
  • Choo, K. and Dehghantanha, A. (eds.) “Handbook of Big Data Privacy”. Cham: Springer Nature, 2020.
  • Ren, W., Wang, L., Choo, K. and Xhafa, F., (eds.) “Security and Privacy for Big Data, Cloud Computing and Applications”. London: Institution of Engineering and Technology (IET), 2019.
  • Witzleb, N., Paterson, M. and Richardson, J., (eds.). “Big Data, Political Campaigning and the Law”. London: Routledge, 2020.
  • Bishop M., “Computer Security: Art and Science”, Addison-Wesley, 2015.
  • Pfleeger C.P., Shari Lawrence Pfleeger, Jonathan Margulles, “Security in Computing”, Pearson, 2015.
  • Buchmann J., “Introduction to Cyptography”, 2nd Ed., Springer, 2004.
  • Casey E., “Handbook of Computer Crime Investigation – Forensic Tools and Technology”, Academic Press, 2002.
  • Mitnick K.D., Simon W.L., “The Art of Deception”, John Wiley & Sons, 2002.
  • Pieprzyk J., Hardjono T., Seberry J., “Fundamentals of Computer Security”, Springer, 2003.
  • Schultz, E., “Incident Response: A Strategic Guide to Handling System and Network Security Breaches”, New Riders Publishing, 2002.
  • Spitzner L., “Honeypots – Tracking Hackers”, Addison Wisley, 2003.
  • Young S., Aitel D., “The Hacker’s Handbook – The Strategy behind Breaking into and Defending Networks”, Auerbach, 2004.

Related scientific journals:

  1. International Journal of Information Security, Springer
  2. Journal of Computer Security, IOS Press
  3. Cybersecurity, Springer
  4. Journal of Cyber Policy, Taylor & Francis

Internet sources:

  1. https://ec.europa.eu/info/law/law-topic/data-protection_en – Data Protection Topics (European Commission)
  2. https://www.enisa.europa.eu/ – European Union Agency for Cybersecurity
  3. http://www.nist.gov – National Institute of Standards and Technology (US)
  4. http://www.itu.int – International Telecommunication Union