IT & Mobile Security

Secure Big Data

Seminar, 2.00 ECTS

 

Course content

The course offers an application-oriented study of Big Data data models, architectures and principles. Storage and database systems in the Big Data environment are tested using practice-oriented scenarios. In particular, the security aspects of these technologies, as well as related best practices, are discussed. Special care is taken to provide enough room for discussion of current technological developments in the area of ??Big Data.

Learning outcomes

The students acquire detailed understanding of data security, especially the security of Big Data technologies. In addition to that, the students will be able to successfully participate in scientific research work in order to present his/her research impressively to the scientific community. He/ she is also able to create and present scientific posters.

Recommended or required reading and other learning resources / tools

Books: Natan R. Database Security, Ambler S. Database Refactoring; Marz N. Big Data; King, Ronald (2012). Research Methods for Information Systems. Orca Dorcauk Orphan; Hoboken, NJ. Robson, C. (2002). Real World Research. Blackwell Publishing, Oxford. Lebrun, J.-L.

Mode of delivery

2 ECTS seminar

Prerequisites and co-requisites

modul Information Systems

Assessment methods and criteria

continuous assessment