The inner features of mobile devices such as their size (small and usually constrained in terms of energy and computational resources) and their use of a wireless channel, makes many of the traditional security mechanisms useless. As a consequence lightweight mechanisms and physical security become important.
The goal of the course is to make the student able to manage the particular techniques needed to guarantee security in a mobile computing scenario.
In order to fulfill this goal, students must acquire certain knowledge, capacities and attitudes. (PO: a, b, c, d, e, f, g, h,, j, k)
Regarding knowledge, students will be able to:
- Understand the security risks inherent to a mobile scenario. (PO: b, e, j)
- Know the physical security measures that can be applied to mobile devices. (PO: b, e, j)
- Master the fundamental techniques to protect the information stored in mobile devices. (PO: a, b, c, e, f, j, k)
- To have a good command of the main security protocols that rule mobile communications. (PO: a, e)
Regarding capacities, students will be able to:
- Analyze the vulnerabilities in a mobile computing scenario. (PO: b, e, j, k)
- Design and deploy the appropriate security mechanisms to guarantee a predefined security level. (PO: a, b, c, d, e, j, k)
Regarding attitudes, students will adopt:
- A suspicious attitude towards security in mobile devices. (PO: e, g, h, j)
- A curious attitude in order to find new vulnerabilities in the open systems where these devices are usually deployed. (PO: e, j, k)
- An analytical perspective of technology that allows them to apply appropriate solutions to the particular security problems this kind of devices faces. (PO: e, h, j, k)