The conceptual difference between hashing and encryption, including when each technique is appropriate.
The principles behind JWT-based authentication, including the structure of tokens, claims, expirations, and trust relationships.
The purpose of HTTPS/TLS and how encrypted transport protects data in transit.
The core differences between symmetric and asymmetric encryption and their typical use cases.
How SQL injection attacks occur, and why parameterized queries and ORM frameworks mitigate this risk.
Skills – The student can:
Implement secure password storage by applying BCrypt hashing and verification within backend services.
Configure and apply JWT authentication, including token generation, validation, and refresh token rotation.
Use secure data-access patterns in EF Core to prevent SQL injection vulnerabilities.
Document and propose the application of symmetric and asymmetric encryption for protecting images and geolocation data.
Apply principles of secure communication by describing how HTTPS/TLS should be integrated into a backend architecture.
Competencies – The student can:
Assess security risks related to storing and transmitting GDPR-sensitive data such as license plates, images, and GPS coordinates, and propose appropriate mitigations.
Design secure data flows that combine hashing, token-based authentication, encrypted transport, and planned at-rest encryption.
Reflect on current security limitations in the prototype and articulate well-reasoned improvement strategies (e.g., endpoint authorization, TLS enforcement, report signing).
Communicate security-related design decisions to stakeholders and explain how they support evidence integrity and data protection.
Independently acquire new security techniques and apply them to project-specific challenges in backend development.