Checking date: 15/05/2024


Course: 2024/2025

BlockChain and Security Technologies
(17879)
Master in Financial Sector Technologies: FinTech (Plan: 461 - Estudio: 313)
EPI


Coordinating teacher: FUENTES GARCIA ROMERO DE TEJADA, JOSE MARIA DE

Department assigned to the subject: Computer Science and Engineering Department

Type: Electives
ECTS Credits: 3.0 ECTS

Course:
Semester:




Requirements (Subjects that are assumed to be known)
None
Objectives
The objective of this course is to highlight the threats faced by computer systems, with a focus on protecting the data they handle. Once these threats are understood, the course explores cryptographic mechanisms that can mitigate them. These mechanisms are also directly or indirectly used in blockchains. The fundamentals of blockchains, the programming of applications based on them, and their associated security issues are also covered in this course. Finally, a brief overview of the regulatory and legal aspects related to cybersecurity is provided.
Skills and learning outcomes
Description of contents: programme
1.- IT Security introduction 1.1. Definitions 1.2. Security services 1.3. Security mechanisms 1.4. Vulnerabilities and threats. Current situation 2.- Cryptography notions 2.1. Entropy and randomness 2.2. Attacks. Complexity 3.- Security mechanisms for financial data 3.1. Data encryption 3.2. Authentication 3.3. Hash functions 3.4. Digital signatures 4.- Blockchain fundamentals and its applications 4.1. Blockchain. Basic concepts 4.2. Consensus strategies 4.3. Smart contracts 4.4. Blockchain applications 5.- Cryptocurrencies 5.1. Bitcoin 5.2. Ethereum 5.3. Monero 5.4. Other altcoins 6.- Legal framework 6.1. GDPR 6.2. eIDAS 6.3. NIS Directive 6.4. Spanish National Security Scheme 6.5. Other regulations
Learning activities and methodology
Learning activities AF1 Theoretical sessions AF2 e-learning activities AF3 Theoretical and practical assignments AF4 Lab assignments AF5 Tutorials AF6 Work in groups AF7 Individual work by the student Methodology MD1 Lectures in which the main concepts are developed and the bibliography is pointed out. MD2 Reading of materials provided by the lecturer to support the notions addressed in the subject MD3 Practical case resolution, either individually or in groups MD5 Development of assignments and reports either individually or in groups MD6 e-learning-related activities Tutorials will be scheduled in two time frames per week. Their schedule will be published through Aula Global. Tutorials will be either physical or through online means. They will have to be requested sufficiently in advance by e-mail. Students may also request other schedules, upon availability of the lecturer.
Assessment System
  • % end-of-term-examination 60
  • % of continuous assessment (assigments, laboratory, practicals...) 40

Calendar of Continuous assessment


Basic Bibliography
  • Anderson, Ross. Security Engineering: A guide to Building Dependable Distributed Sistems (2nd edition). Wiley. 2008
  • Antonopoulos, Andreas. Mastering Bitcoin. O'Reilly. 2015
  • Antonopoulos, Andreas; Wood, Gavin. Mastering Ethereum. O'Reilly. 2018
  • Pfleeger, Charles et al. Security in Computing (4th edition). Prentice Hall. 2007
  • Stallings, William. Cryptography and Network Security: Principles and Practice. Prentice Hall. 2013
Recursos electrónicosElectronic Resources *
Additional Bibliography
  • Antonopoulos, Andreas. Mastering Bitcoin. O' Reilly. 2015
  • Antonopoulos, Andreas. Mastering Ethereum: Building Smart Contracts and Dapps. O' Reilly. 2018
  • Bishop, Matt. Computer Security: Art & Science.. Addison-Wesley. 2015
Recursos electrónicosElectronic Resources *
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN


The course syllabus may change due academic events or other reasons.