Checking date: 18/05/2023


Course: 2023/2024

Security of Digital Documents
(17284)
Master in Libraries, Archives and Digital Continuity (Plan: 500 - Estudio: 335)
EPH


Coordinating teacher: FUENTES GARCIA ROMERO DE TEJADA, JOSE MARIA DE

Department assigned to the subject: Computer Science and Engineering Department

Type: Compulsory
ECTS Credits: 3.0 ECTS

Course:
Semester:




Requirements (Subjects that are assumed to be known)
No specific requirements are in place
Objectives
The student after passing the subject must: Know and understand the objectives of information security and the threats and vulnerabilities of information systems. Know and understand the problems of authentication and integrity of the electronic document and the tools to guarantee them. Know cybersecurity-related legal issues and particularly those focusing on the security of digital documents
Skills and learning outcomes
Description of contents: programme
The primary objective for students is to recognise IT security as an unavoidable aspect of digital information and its supporting systems. Subordinated to this overall goal, the student will be able to identify the dimensions of IT security (confidentiality, integrity and availability), threats (technical or physical) that digital information is exposed to and to know and use the main tools to protect it. The program is divided into five main sections: PART ONE: Students will discuss the dimensions of security (confidentiality, integrity, availability), emphasising their relative importance according to specific environments and introduce specific security measures for each one of them. The different types of threats and the vulnerabilities of IT systems will be described. PART TWO: We analyse the problems of conservation over a long time and safe destruction of electronic documents. PART THREE: We consider data encryption as an essential tool for security, exploring various systems and their intended uses. PART FOUR: Signature and digital certificates as a basic tool to guarantee integrity together with document authenticity and non-repudiation. PART FIVE: We will present the security problems arising in IT systems accessed via computer networks as well as the specific protection mechanisms. Thus, the detailed program is as follows: 1. Introduction to digital document security 1.1 - Security goals 1.2 - Security mechanisms: legal, administrative, physical and technical protections 1.3.- Malware 1.4.- IT security. Vulnerabilities. 2. Electronic documents: Integrity and removal 2.1 - Integrity techniques. Use of hash functions 2.2 - Secure removal 2.3.- Legal / administrative storage conditions for documents containing personal data 3. Data Encryption 3.1 - Introduction to data hiding techniques 3.2 - Cryptosystem scheme 3.3.- Secret- and public-key encryption 3.4.- Encryption in Microsoft Office, PDF and other user apps 3.5.- Specific encryption software 4. Digital signature and user authentication 4.1.- Introduction to digital signature. Differences with handwritten one 4.2. Timestamping 4.3.- Digital Certificates. Types 4.4 - Certification Authorities. Examples. The DNI-e 4.5.- Certificate revocation 4.6.- User Authentication 5. Computer Network Security 5.1 - Threats to computer networks. 5.2.- Secure connection protocols with servers. TLS/SSL
Learning activities and methodology
TRAINING ACTIVITIES OF THE STUDY PLAN RELATED TO SUBJECTS AF1 Individual work to study theoretical-practical materials (40 h) AF3 Theoretical-practical classes (3 h) AF4 Tutorials AF5 Group work (47 h) TEACHING METHODOLOGIES MD1 Lectures with support of computer and audiovisual media, in which the main concepts of the subject are developed and the bibliography is provided to complement the students' learning. MD3 Resolution of practical cases, problems, etc. raised by the teacher individually or in a group MD5 Preparation of individual and group work and reports MD6 Reading of theoretical and practical teaching materials Office hours will be published in Aula Global, the corporate e-learning platform. There will be two time frames, one for physical attendance and another one for online attendance. In any case, this should be requested by e-mail sufficiently in advance. Apart from these time frames, students may request office hours in other time frames, upon availability of the lecturer
Assessment System
  • % end-of-term-examination 50
  • % of continuous assessment (assigments, laboratory, practicals...) 50
Calendar of Continuous assessment
Basic Bibliography
  • Paar, C.; Pelzl, J.. Understanding Cryptography. Springer. 2010
  • Ronald L. Mendell. Document Security: Protecting Physical and Electronic Content.. Charles C Thomas Pub Ltd. 2007
Recursos electrónicosElectronic Resources *
Additional Bibliography
  • Charlie Kaufman, Radia Perlman, Mike Speciner. Network Security: Private Communication in a Public World (Chap. 2). Prentice Hall. Second edition (2002)
  • Christoph Paar, Jan Pelzl. Understanding cryptography (Chap. 1 & 6). Springer-verlag. 2010
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN


The course syllabus may change due academic events or other reasons.