Possess and understand knowledge that provides a basis or opportunity to be original in the development and / or application of ideas, often in a research context.
That students know how to apply the knowledge acquired and their ability to solve problems in new or unfamiliar environments within broader (or multidisciplinary) contexts related to their area of ¿¿study.
That students are able to integrate knowledge and face the complexity of making judgments based on information that, being incomplete or limited, includes reflections on social and ethical responsibilities linked to the application of their knowledge and judgments.
That the students possess the learning skills that allow them to continue studying.
Understand and apply research methods and techniques of cyber attacks to a specific installation.
Conceive, design, implement and maintain a global Cyber ¿¿defense system in a defined context.
Know the technical regulations and the legal dispositions of application in the cybersecurity matter, its implications in the design of systems and in the application of security tools.
Know the current trends in cyberattack techniques and the experiences learned in real cases.
Apply the appropriate services, mechanisms and security protocols in a specific case.
Analyze the risks of the introduction of personal devices in a professional environment. Know and apply the measures to control these risks.
LEARNING RESULTS
Upon the passing of this subject students students should be able to:
Understand new ICT trends, their associated risks, as well as judge the suitability to counteract them from current and developing security services and mechanisms.
Know the legal, Spanish, community and international framework in which Cybersecurity, Cyber Defense and Cyber attack develops.
Design an integral model (legal, physical, administrative-organizational and technical) to protect one (or several) real information system, operating in a certain environment.
To know in the actions of the Judicial Power, the Security Corps and the Armed Forces in the prevention and persecution of cybercriminals, cyberterrorists and cyberespies and the protection of critical infrastructures.