Provides a working knowledge of fundamental data protection techniques for protecting
data at rest, data in motion, and data in processing. Techniques include encryption
algorithms and systems (symmetric, asymmetric, standard, digital certificates, and
hashes), Steganography, data masking, and data obfuscation. Examines access controls,
availability, authentication, confidentiality, data integrity, and non-repudiation
as well as defenses against DDOS and other data attacks. Security by diversity and
security in depth are presented as fundamental requirements. Prerequisite: TECH 5F70.
Equivalent to TECH 6350.