Checking date: 28/01/2021

Course: 2020/2021

Vulnerabilities, threats and computer security protocols
Study: Bachelor in Security Engineering (272)

Coordinating teacher: CAMARA NUÑEZ, MARIA CARMEN

Department assigned to the subject: Department of Computer Science and Engineering

Type: Compulsory
ECTS Credits: 6.0 ECTS


Students are expected to have completed
- Mathematics - Statistics and Information Module II (Basic Training) and the material (subject) of Statistics (Operations Research) Module III (Fundamentals of Engineering) - Information hiding techniques
The powers intended that students acquire are: - Identify security objectives and vulnerabilities, threats and risks of a given information system in a defined operational environment. Analyze the possible security measures to be used. - Evaluate the security services to be implemented in a given system and design and implement mechanisms and subsequent protocols. - Evaluate and implement appropriate authentication mechanisms to access a specific system. - Use the signature and certification systems in a particular environment.
Description of contents: programme
1. Introduction to networks and distributed systems. 2. Status of security systems and products. 3. Analysis and classification of attacks. 4. Measures, services and security mechanisms. 5. Digital Signature. Certification authorities. Public key infrastructures. 6. Systems and multifactor authentication based on public key infrastructure. 7. Security protocols.
Learning activities and methodology
The training activities include: 1st. Lectures, individual or group tutorials, personal work and student presentations, including theoretical and practical tests and examinations. To facilitate their development students receive class notes in the appropriate web tool and have basic reference texts that allow them to complete and deepen the most important or more fundamental issues. 2nd. Practice in computer rooms in small groups, individual tutorials and personal work, including tests and examinations. All it aimed at the acquisition of practical skills related to the program for each subject. Due to the uncertainty about the teaching format to which the health circumstances will lead us during the next course, it is expected to start in the semi-attendance mode and may lead to training 100% classroom or 100% online depending on the evolution of the spread or control of the pandemic and the health and hygiene standards dictated by the authorities of the sector.
Assessment System
  • % end-of-term-examination 55
  • % of continuous assessment (assigments, laboratory, practicals...) 45
Basic Bibliography
  • Anderson, Ross. Security Engineering: A guide to Building Dependable Distributed Sistems (2nd edition). Wiley. 2008
  • Kaufman, Charlie, et al.. Network Security: Private Communication in a Public World. Second Edition.. Prentice Hall. 2002
  • Pfleeger, Charles et al. Security in Computing (4ª edition). Prentice Hall. 2007
  • Stallings, William. Cryptography and Network Security: Principles and Practice. Prentice Hall. 2013
  • Vacca, John R. (editor). Computer and Information Security Handbook. Elsevier (The Morgan Kaufmann Series in Computer Security). 2009
Recursos electrónicosElectronic Resources *
Additional Bibliography
  • Bishop, Matt. Computer Security: Art & Science. (cap 12). Addison-Wesley. 2015
  • Kurose, James F. Ross, Keith W.. Redes de Computadoras, un enfoque descendente. Pearson. 2017
Recursos electrónicosElectronic Resources *
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN

The course syllabus and the academic weekly planning may change due academic events or other reasons.