Checking date: 22/01/2021

Course: 2022/2023

Secure Architecture
Study: Master in cybersecurity (288)

Coordinating teacher: HARO MALDONADO, MIGUEL

Department assigned to the subject: Telematic Engineering Department

Type: Electives
ECTS Credits: 3.0 ECTS


Requirements (Subjects that are assumed to be known)
Students should work comfortable in Unix environments and have knowledge on Public Key Infrastructure (PKI), Data Protection subject.
After the course, the students will be able to: - Analyze the architecture of an information system from a security point of view. - Design information systems architectures that fulfil a set of specified security requirements. - Apply appropriate security services, mechanisms and security protocols that minimize risks and provide resistance to attacks, mainly DDoS. - Know procedures and principles to handle classified information. - Apply acquired knowledge to solve problems under novel or almost novel situations or within broader (multidisciplinar) contexts related with cyber security. - Discuss in a public audience about their acquired knowledge, and the conclusions from the work. Students will be able to give their foundational and most convincing reasons to a specialized and non specialized audience in a clear way, without ambiguities. -Continue studying in a autonomous or self-directed way
Skills and learning outcomes
Description of contents: programme
This course presents and elaborates aspects related to the design of secure architectures that minimize security risks and provide resistance to attacks. The course also covers the principles, procedures and systems for handling classified information, as well as elements of physical security. The course program is organized as follows: 1. Secure Architectures 1.1. Motivation and Practical Cases 1.2. Security Design Principles 1.3. Security in Cloud Computing 2. Authorization 2.1. Traditional Access Control Models: DAC, MAC and RBAC 2.2. Curent Access Control Models: ABAC 2.3. Identity & Access Control Architecture (IAM) and Languages: XACML/SAML. 3. Attack Tolerance 3.1. DoS Overview 3.2. Protection against DDoS 3.3. Back-up systems 4. Multilevel and Multilateral Security Systems 4.1. Information Classification 4.2. Principles and Procedures for handling classified Information 4.3. MLS Systems. Examples and practical considerations 5. Physical Security 5.1. Security against emanations. TEMPEST 5.2. Intrusion resistant Hardware
Learning activities and methodology
The teaching methodology consists of: - Lectures given by the professor using audiovisual elements to develop the main concepts and to provide additional references for further learning. - Complementary activities to broaden and consolidate the acquired knowledge. Such activities are of different nature: problems, discussion of practical cases, and/or exercises using the computers in order to test tools that are useful for the deployment of secure architectures. - Elaboration and oral presentation of technical works by the students.
Assessment System
  • % end-of-term-examination 40
  • % of continuous assessment (assigments, laboratory, practicals...) 60
Basic Bibliography
  • Bhavani Thuraisingham. Developing and Securing the Cloud. Auerbach Publications. 2013
  • Dieter Gollmann.. Computer Security.. John Wiley & Sons.. 2011
  • Sam Bishop.. Computer Security: Art and Science.. Addison- Wesley Professional.. 2003
  • Sam Newman.. Building Microservices.. O'Reilly Media, Inc.. 2015
Additional Bibliography
  • Fran Ramírez, Elías Grande y Rafael Troncoso.. Docker: SecDevOps.. 0xWord.. 2018
  • Stephane Jourdan, Pierre Pomes.. Infrastructure as Code (IAC) Cookbook.. PACKT.. 2017
  • William Stallings and Lawrie Brown.. Computer Security: principles and practice.. Pearson Education.. 2008

The course syllabus may change due academic events or other reasons.