Checking date: 08/05/2019


Course: 2019/2020

(17448)
Study: Bachelor in Management of Public Security (341)


Coordinating teacher: GONZALEZ MANZANO, LORENA

Department assigned to the subject: Department of Computer Science and Engineering

Type: Compulsory
ECTS Credits: 6.0 ECTS

Course:
Semester:




Students are expected to have completed
- Mathematics - Statistics and Information Module II (Basic Training) and the material (subject) of Statistics (Operations Research) Module III (Fundamentals of Engineering) - Information hiding techniques
Competences and skills that will be acquired and learning results. Further information on this link
The powers intended that students acquire are: - Identify security objectives and vulnerabilities, threats and risks of a given information system in a defined operational environment. Analyze the possible security measures to be used. - Evaluate the security services to be implemented in a given system and design and implement mechanisms and subsequent protocols. - Evaluate and implement appropriate authentication mechanisms to access a specific system. - Use the signature and certification systems in a particular environment.
Description of contents: programme
1. Introduction to networks and distributed systems. 2. Status of security systems and products. intrinsic vulnerabilities and extrinsic. 3. Analysis and classification of attacks. Assessment of its consequences. 4. Measures, services and security mechanisms. They prevent risks. 5. Digital Signature. Certification authorities. Public key infrastructures. 6. Systems and multifactor authentication based on public key infrastructure. 7. Security protocols.
Learning activities and methodology
The training activities include: 1st. Lectures, individual or group tutorials, personal work and student presentations, including theoretical and practical tests and examinations. To facilitate their development students receive class notes in the appropriate web tool and have basic reference texts that allow them to complete and deepen the most important or more fundamental issues. 2nd. Practice in computer rooms in small groups, individual tutorials and personal work, including tests and examinations. All it aimed at the acquisition of practical skills related to the program for each subject.
Assessment System
  • % end-of-term-examination 55
  • % of continuous assessment (assigments, laboratory, practicals...) 45
Basic Bibliography
  • Anderson, Ross. Security Engineering: A guide to Building Dependable Distributed Sistems (2nd edition). Wiley. 2008
  • Kaufman, Charlie, et al.. Network Security: Private Communication in a Public World. Second Edition.. Prentice Hall. 2002
  • Pfleeger, Charles et al. Security in Computing (4ª edition). Prentice Hall. 2007
  • Stallings, William. Cryptography and Network Security: Principles and Practice. Prentice Hall. 2013
  • Vacca, John R. (editor). Computer and Information Security Handbook. Elsevier (The Morgan Kaufmann Series in Computer Security). 2009
Recursos electrónicosElectronic Resources *
Additional Bibliography
  • Bishop, Matt. Computer Security: Art & Science. (cap 12). Addison-Wesley. 2015
  • Kurose, James F. Ross, Keith W.. Redes de Computadoras, un enfoque descendente. Pearson. 2017
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN


The course syllabus and the academic weekly planning may change due academic events or other reasons.