Checking date: 14/05/2024


Course: 2024/2025

Security of Digital Documents
(17284)
Master in Libraries, Archives and Digital Continuity (Plan: 500 - Estudio: 335)
EPH


Coordinating teacher: FUENTES GARCIA ROMERO DE TEJADA, JOSE MARIA DE

Department assigned to the subject: Computer Science and Engineering Department

Type: Compulsory
ECTS Credits: 3.0 ECTS

Course:
Semester:




Requirements (Subjects that are assumed to be known)
No specific requirements are in place
Objectives
The student after passing the subject must: Know and understand the objectives of information security and the threats and vulnerabilities of information systems. Know and understand the problems of authentication and integrity of the electronic document and the tools to guarantee them. Know cybersecurity-related legal issues and particularly those focusing on the security of digital documents
Skills and learning outcomes
Description of contents: programme
The primary objective for students is to recognise IT security as an unavoidable aspect of digital information and its supporting systems. Subordinated to this overall goal, the student will be able to identify the dimensions of IT security (confidentiality, integrity and availability), threats (technical or physical) that digital information is exposed to and to know and use the main tools to protect it. The program is divided into five main sections: PART ONE: Students will discuss the dimensions of security (confidentiality, integrity, availability), emphasising their relative importance according to specific environments and introduce specific security measures for each one of them. The different types of threats and the vulnerabilities of IT systems will be described. PART TWO: We analyse the problems of conservation over a long time and safe destruction of electronic documents. PART THREE: We consider data encryption as an essential tool for security, exploring various systems and their intended uses. PART FOUR: Signature and digital certificates as a basic tool to guarantee integrity together with document authenticity and non-repudiation. PART FIVE: We will present the security problems arising in IT systems accessed via computer networks as well as the specific protection mechanisms. Thus, the detailed program is as follows: 1. Introduction to digital document security 1.1 - Security goals 1.2 - Security mechanisms: legal, administrative, physical and technical protections 1.3.- Malware 1.4.- IT security. Vulnerabilities. 2. Electronic documents: Integrity and removal 2.1 - Integrity techniques. Use of hash functions 2.2 - Secure removal 2.3.- Legal / administrative storage conditions for documents containing personal data 3. Data Encryption 3.1 - Introduction to data hiding techniques 3.2 - Cryptosystem scheme 3.3.- Secret- and public-key encryption 3.4.- Encryption in Microsoft Office, PDF and other user apps 3.5.- Specific encryption software 4. Digital signature and user authentication 4.1.- Introduction to digital signature. Differences with handwritten one 4.2. Timestamping 4.3.- Digital Certificates. Types 4.4 - Certification Authorities. Examples. The DNI-e 4.5.- Certificate revocation 4.6.- User Authentication 5. Computer Network Security 5.1 - Threats to computer networks. 5.2.- Secure connection protocols with servers. TLS/SSL
Learning activities and methodology
* THE TRAINING ACTIVITIES ACORDING TO THE STUDY PLANIFICATION WILL BE: AF1 Individual work for the study of theoretical and practical materials developed and contributed by the teacher. AF2 Individual work for problem solving and case studies. AF3 Theoretical-practical classes. AF4 Tutorials. AF5 Group work. AF6 Active participation in forums enabled by the teacher in the virtual educational platform. AF7 Perform self-assessment test for content review. AF8 Synchronous online debates and colloquiums Type of activity Is it synchronous? Total hours Hours of synchronous interactivity No. In-person hours % In-person attendance Student AF1 NO 24 0 0 0 AF2 NO 22 0 0 0 AF3 YES 3 3 3 100 AF4 YES 3 3 0 0 AF5 NO 30 0 0 0 AF6 NO 1 0 0 0 AF7 YES 3 3 0 0 AF8 YES 3 3 0 0 Total 89 12 3 3,33% * TEACHING METHODOLOGIES: MD1 Presentations in the teacher's class with support of computer and audiovisual media, in which the main concepts of the subject are developed and the bibliography is provided to complement the students' learning. MD2 Critical reading of texts recommended by the teacher of the subject: Press articles, reports, manuals and / or academic articles, either for later discussion in class, or to expand and consolidate the knowledge of the subject. MD3 Resolution of practical cases, problems, etc. Raised by the teacher individually or in a group. MD4 Exposition and discussion in class, under the moderation of the professor of subjects related to the content of the subject, as well as of practical cases. MD5 Preparation of individual and group work and reports. MD6 Reading of theoretical and practical teaching materials.
Assessment System
  • % end-of-term-examination 50
  • % of continuous assessment (assigments, laboratory, practicals...) 50

Calendar of Continuous assessment


Basic Bibliography
  • Paar, C.; Pelzl, J.. Understanding Cryptography. Springer. 2010
  • Ronald L. Mendell. Document Security: Protecting Physical and Electronic Content.. Charles C Thomas Pub Ltd. 2007
Recursos electrónicosElectronic Resources *
Additional Bibliography
  • Charlie Kaufman, Radia Perlman, Mike Speciner. Network Security: Private Communication in a Public World (Chap. 2). Prentice Hall. Second edition (2002)
  • Christoph Paar, Jan Pelzl. Understanding cryptography (Chap. 1 & 6). Springer-verlag. 2010
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN


The course syllabus may change due academic events or other reasons.