Checking date: 26/04/2024

Course: 2024/2025

Vulnerabilities, threats and computer security protocols
Bachelor in Security Engineering (Plan: 282 - Estudio: 272)

Coordinating teacher: GARROTE MARTIN, ALBERTO

Department assigned to the subject: Computer Science and Engineering Department

Type: Compulsory
ECTS Credits: 6.0 ECTS


Requirements (Subjects that are assumed to be known)
- Mathematics - Statistics and Information Module II (Basic Training) and the material (subject) of Statistics (Operations Research) Module III (Fundamentals of Engineering) - Information hiding techniques
- Identify security objectives and vulnerabilities, threats and risks of a given information system in a defined operational environment. Analyze the possible security measures to be used. - Evaluate the security services to be implemented in a given system and design and implement mechanisms and subsequent protocols. - Evaluate and implement appropriate authentication mechanisms to access a specific system. - Use the signature and certification systems in a particular environment.
Skills and learning outcomes
Description of contents: programme
1. Introduction to networks and distributed systems. 2. Status of security systems and products. 3. Analysis and classification of attacks. 4. Measures, services and security mechanisms. 5. Digital Signature. Certification authorities. Public key infrastructures. 6. Systems and multifactor authentication based on public key infrastructure. 7. Security protocols.
Learning activities and methodology
The training activities include: 1st. Lectures, individual or group tutorials, personal work and student presentations, including theoretical and practical tests and examinations. To facilitate their development students receive class notes in the appropriate web tool and have basic reference texts that allow them to complete and deepen the most important or more fundamental issues. 2nd. Practice in computer rooms in small groups, individual tutorials and personal work, including tests and examinations. All it aimed at the acquisition of practical skills related to the program for each subject.
Assessment System
  • % end-of-term-examination 60
  • % of continuous assessment (assigments, laboratory, practicals...) 40
Calendar of Continuous assessment
Extraordinary call: regulations
Basic Bibliography
  • Anderson, Ross. Security Engineering: A guide to Building Dependable Distributed Sistems (2nd edition). Wiley. 2008
  • Kaufman, Charlie, et al.. Network Security: Private Communication in a Public World. Second Edition.. Prentice Hall. 2002
  • Pfleeger, Charles et al. Security in Computing (4ª edition). Prentice Hall. 2007
  • Stallings, William. Cryptography and Network Security: Principles and Practice. Prentice Hall. 2013
  • Vacca, John R. (editor). Computer and Information Security Handbook. Elsevier (The Morgan Kaufmann Series in Computer Security). 2009
Recursos electrónicosElectronic Resources *
Additional Bibliography
  • Bishop, Matt. Computer Security: Art & Science. (cap 12). Addison-Wesley. 2015
  • Kurose, James F. Ross, Keith W.. Redes de Computadoras, un enfoque descendente. Pearson. 2017
Recursos electrónicosElectronic Resources *
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN

The course syllabus may change due academic events or other reasons.