Learning Outcome (LO) Summary: Understand and apply the fundamental principles of cryptography to ensure the confidentiality, integrity, availability, and non-repudiation of data, while recognizing and utilizing cryptographic methods and secure protocols in practical scenarios.
Component Learning Outcomes
| ID | Component Learning Outcomes (LOs) | Cross-Cutting Concepts |
| DS1 | Explain cryptography including its relationship to confidentiality, integrity, and availability of data. [Guidance] | CIA |
| DS2 | Encrypt a small data set using a simple encryption algorithm. [Guidance] | CIA |
| DS3 | Describe basic cryptography terms, including ciphers, cryptographic keys, encrypt, decrypt, cryptanalysis, cryptographic hashing, non-repudiation, and cryptology. [Guidance] | CIA |
| DS4 | Use symmetric ciphers with a shared secret key to transform plaintext to ciphertext. [Guidance] | CIA |
| DS5 | Use asymmetric ciphers with a public key to transform plaintext to ciphertext. [Guidance] | CIA |
| DS6 | Use cryptographic hash functions to create one-way transformations that convert data of arbitrary length into fixed-length hash values. [Guidance] | CIA |
| DS7 | Recognize secure protocols, like HTTPS and SSH, which use cryptography to protect communication. [Guidance] | CIA
Systems thinking Adversarial thinking |
| DS8 | Recognize the critical role of key management and public key infrastructure (PKI) for ensuring the secure generation, distribution, and storage of cryptographic keys. [Guidance] | CIA
Systems thinking |
Suggestions Accepted for consideration for the next Edition:
Please provide your suggestions about this topic area. All submitted comments will be reviewed at the end of the month. Comments accepted for inclusion will be listed above.