Checking date: 20/06/2022


Course: 2022/2023

Vulnerabilities, threats and computer security protocols
(17448)
Study: Bachelor in Management of Public Security (341)


Coordinating teacher: GONZALEZ MANZANO, LORENA

Department assigned to the subject: Department of Computer Science and Engineering

Type: Compulsory
ECTS Credits: 6.0 ECTS

Course:
Semester:




Requirements (Subjects that are assumed to be known)
- Mathematics - Statistics and Information Module II (Basic Training) and the material (subject) of Statistics (Operations Research) Module III (Fundamentals of Engineering) - Information hiding techniques
Objectives
- Identify security objectives and vulnerabilities, threats and risks of a given information system in a defined operational environment. Analyze the possible security measures to be used. - Evaluate the security services to be implemented in a given system and design and implement mechanisms and subsequent protocols. - Evaluate and implement appropriate authentication mechanisms to access a specific system. - Use the signature and certification systems in a particular environment.
Skills and learning outcomes
Description of contents: programme
1. Introduction to networks and distributed systems. 2. Status of security systems and products. intrinsic vulnerabilities and extrinsic. 3. Analysis and classification of attacks. Assessment of its consequences. 4. Measures, services and security mechanisms. They prevent risks. 5. Digital Signature. Certification authorities. Public key infrastructures. 6. Systems and multifactor authentication based on public key infrastructure. 7. Security protocols.
Learning activities and methodology
The training activities include: 1st. Lectures, individual or group tutorials, personal work and student presentations, including theoretical and practical tests and examinations. To facilitate their development students receive class notes in the appropriate web tool and have basic reference texts that allow them to complete and deepen the most important or more fundamental issues. 2nd. Practice in computer rooms in small groups, individual tutorials and personal work, including tests and examinations. All it aimed at the acquisition of practical skills related to the program for each subject.
Assessment System
  • % end-of-term-examination 55
  • % of continuous assessment (assigments, laboratory, practicals...) 45
Calendar of Continuous assessment
Basic Bibliography
  • Anderson, Ross. Security Engineering: A guide to Building Dependable Distributed Sistems (2nd edition). Wiley. 2008
  • Christof Paar, Jan Pelzl. Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media. 2009
  • Pfleeger, Charles et al. Security in Computing (4ª edition). Prentice Hall. 2007
  • Vacca, John R. (editor). Computer and Information Security Handbook. Elsevier (The Morgan Kaufmann Series in Computer Security). 2009
Recursos electrónicosElectronic Resources *
Additional Bibliography
  • Bishop, Matt. Computer Security: Art & Science. (cap 12). Addison-Wesley. 2015
  • Kurose, James F. Ross, Keith W.. Redes de Computadoras, un enfoque descendente. Pearson. 2017
Detailed subject contents or complementary information about assessment system of B.T.
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN


The course syllabus may change due academic events or other reasons.