| 0 |
1 |
2 |
3 |
4 |
|||
| From this module I am
learning |
nothing |
1 |
10 |
9 |
10 |
0 |
a lot |
| The module is |
too easy |
2 |
2 |
18 |
13 |
1 |
too difficult |
| The lectures are |
boring |
8 |
13 |
10 |
8 |
0 |
interesting |
| The module is |
too waffly |
9 |
5 |
19 |
4 |
0 |
too technical |
| 0 |
1 |
2 |
3 |
4 |
|
| Introduction/overview: threats, risk, vulnerabilities and impact | 1 |
1 |
20 |
7 |
3 |
| Symmetric key encryption | 1 |
0 |
7 |
16 |
1 |
| Secure one-way hash functions | 0 |
0 |
6 |
21 |
5 |
| Public key encryption | 0 |
0 |
5 |
13 |
14 |
| Secure protocols (not yet
given) |
|||||
| Key certificates and PGP
(not yet given) |
|||||
| Trusted Computing and NGSCB
(not yet given) |