Saltar al contingut Menu
Map
  • Home
  • Information
  • Contact
  • Map

Syllabus

Security in Information Technology ( SI )

Change to no-tab version

ECTS Credits Department Type Requirements Teaching Languages
6.0 AC
  • Specialization Compulsory (Information Technologies)
Pre-correquisit SO
Pre-correquisit XC
  • Spanish   
Correu
Center where the class is given Facultat d'Informàtica de Barcelona (FIB) - Universitat Politècnica de Catalunya - BarcelonaTECH

Description

Introduction to basic concepts of computer security that all graduates should know to do their job without compromising computer systems that manage or program, or their users.
Are also some practical tools that can be used to protect or systems to detect programming errors or configuration may endanger that in case of attack.

Professors

Person in charge

Manel Medina Llinàs (medina@ac.upc.edu)

Other

Jaime M. Delgado Merce (jaime@ac.upc.edu)
Manuel García-Cervigón Gutiérrez (mgarciac@ac.upc.edu)
Weekly hours dedication
T: 3.0 P: 0.0 L: 1.0 AA: 5.6 AD: 0.4



Generic Competences

Transversal Competences

  • SOLVENT USE OF THE INFORMATION RESOURCES

  • G6 - To manage the acquisition, structuring, analysis and visualization of data and information of the field of the informatics engineering, and value in a critical way the results of this management.
  • G6.3 - To plan and use the necessary information for an academic essay (for example, the final project of the grade) using critical reflection about the used information resources. To manage information in a competent, independent and autonomous way. To evaluate the found information and identify its deficiencies.


Technical Competences

  • COMMON TECHNICAL COMPETENCIES

  • CT6 - To demonstrate knowledge and comprehension about the internal operation of a computer and about the operation of communications between computers.
  • CT6.4 - To demonstrate knowledge and capacity to apply the characteristics, functionalities and structure of the Distributed Systems and Computer and Internet Networks guaranteeing its use and management, as well as the design and implementation of application based on them.
  • CT7 - To evaluate and select hardware and software production platforms for executing applications and computer services.
  • CT7.1 - To demonstrate knowledge about metrics of quality and be able to use them.
  • CT7.2 - To evaluate hardware/software systems in function of a determined criteria of quality.
  • CT7.3 - To determine the factors that affect negatively the security and reliability of a hardware/software system, and minimize its effects.
  • CT8 - To plan, conceive, deploy and manage computer projects, services and systems in every field, to lead the start-up, the continuous improvement and to value the economical and social impact.
  • CT8.1 - To identify current and emerging technologies and evaluate if they are applicable, to satisfy the users needs.
  • INFORMATION TECHNOLOGY SPECIALIZATION

  • CTI1 - To define, plan and manage the installation of the ICT infrastructure of the organization.
  • CTI1.1 - To demonstrate understanding the environment of an organization and its needs in the field of the information and communication technologies.
  • CTI1.2 - To select, design, deploy, integrate and manage communication networks and infrastructures in a organization.
  • CTI1.3 - To select, deploy, integrate and manage information system which satisfy the organization needs with the identified cost and quality criteria.
  • CTI2 - To guarantee that the ICT systems of an organization operate adequately, are secure and adequately installed, documented, personalized, maintained, updated and substituted, and the people of the organization receive a correct ICT support.
  • CTI2.3 - To demonstrate comprehension, apply and manage the reliability and security of the computer systems (CEI C6).
  • CTI3 - To design solutions which integrate hardware, software and communication technologies (and capacity to develop specific solutions of systems software) for distributed systems and ubiquitous computation devices.
  • CTI3.1 - To conceive systems, applications and services based on network technologies, taking into account Internet, web, electronic commerce, multimedia, interactive services and ubiquitous computation.

Goals

  1. Being able to understand the threats and security risks of computer systems.

    Sub-Goals
    • Being able to understand the general ideas of the legal implications of computer security.

    Related Competences
  2. Being able to analyze malicious code such as viruses, Trojans, etc..

    Related Competences
  3. Being able to understand and identify mechanisms for access control of an operating system.

    Related Competences
  4. Knowing the problems of security in computer networks and be able to find solutions to protect them.

    Sub-Goals
    • Being able to design firewall and virtual private networks.
    • Being able to understand the operation of intrusion detection systems.

    Related Competences
  5. Being able to design protection mechanisms for distributed applications.

    Sub-Goals
    • Being able to identify security threats and propose solutions in web applications and electronic commerce.

    Related Competences
  6. Being able to understand the need and operation of forensic computer security mechanisms.

    Related Competences
  7. Being able to use cryptographic mechanisms to protect resources.

    Sub-Goals
    • Being able to implement mechanisms for electronic signatures.

    Related Competences
  8. Being able to understand, design and implement public key infrastructure (PKI).

    Sub-Goals
    • Being able to design and manage public key certificates.

    Related Competences
  9. Being able to understand the mechanisms of protection and security policies.

    Related Competences

Contents

1. Introduction

Threats, risk analysis, protection mechanisms, security of communications, security forensics, politicies, recovery, legal aspects, ...

2. Cryptography

Basics of cryptography. Public key. Electronic signatures.

3. PKI Infrastructure

Certificates. Directories. Protocols.

4. Security in operating systems

Malicious Code: Viruses, Trojan horses, worms, spyware, etc. Access Control.

5. Network security

Firewalls. Virtual Private Networks. Secure network protocols. Intrusion detection systems.

6. Security in applications

Security on the web. Secure application protocols. Electronic commerce.

7. Forensic Security

Collection of evidence. Analysis.

Activities

Legend

Activity
Evaluative Activity
Theory hours
Problem hours
Lab hours
Independent Learning Hours
Directed Learning Hours


Development of theme 1. Introduction.
T      P      L      AA    AD    Total 
6.0 0.0 0.0 4.0 0.0 10.0

Alumn: Learning the concepts and objectives associated with this item.

Goals:

Contents
  • 1. Introduction
Vulnerabilities in web applications
T      P      L      AA    AD    Total 
0.0 0.0 3.0 2.0 2.0 7.0

Alumn: Understanding the secure programming techniques described in the session. Understanding the webscarab and webgoat applications included in the OWASP linux distribution

Development Topic 2. Cryptography.
T      P      L      AA    AD    Total 
7.0 0.0 0.0 8.0 0.0 15.0

Alumn: Learning the concepts and objectives associated with this item.

Goals:

Contents
  • 2. Cryptography
Security in wireless networks
T      P      L      AA    AD    Total 
0.0 0.0 2.0 2.0 0.0 4.0

Alumn: Understanding the protocol WEP. Being able to use the tools Airodump linux, aircrack and Aireplay

Development of item 3. Infrastructure PKI.
T      P      L      AA    AD    Total 
8.0 0.0 0.0 9.0 1.0 18.0

Alumn: Learning the concepts and objectives associated with this item.

Goals:

Contents
  • 3. PKI Infrastructure
Using digital certificates and apache (HTTPS)
T      P      L      AA    AD    Total 
0.0 0.0 2.0 2.0 0.0 4.0

Alumn: Being able to create a X.509 certificate with openssl and install it on an Apache web server to configure HTTPS

PKCS: Public-Key Cryptography Standard
T      P      L      AA    AD    Total 
0.0 0.0 2.0 2.0 0.0 4.0

Alumn: Understanding the different formats of the PKCS messages. Being able to create PKCS messages using the linux tool openssl

First theory exam
T      P      L      AA    AD    Total 
1.0 - - 4.0 - 5.0

Theory exam of the following topics: Introduction, Criptography, PKI infrastructure.

Week 8
Type of exam: Theory exam

Goals:
Development of item 4. Security in operating systems.
T      P      L      AA    AD    Total 
5.0 0.0 0.0 5.0 0.0 10.0

Alumn: Learning the concepts and objectives associated with this item.

Goals:

Contents
  • 4. Security in operating systems
Malware analysis
T      P      L      AA    AD    Total 
0.0 0.0 2.0 2.0 0.0 4.0

Alumn: Understanding the different forms to analyze a malicious code. Being able to properly use the analysis tool IDAPro

Development of item 5. Internet security
T      P      L      AA    AD    Total 
8.0 0.0 0.0 9.0 1.0 18.0

Alumn: Learning the concepts and objectives associated with this item.

Goals:

Contents
  • 5. Network security
Iptables i snort
T      P      L      AA    AD    Total 
0.0 0.0 3.0 2.0 0.0 5.0

Alumn: Understanding how the iptables command works as well as its internal operations based on tables and chains. Being able to create snort rules

Documentation about malicious code.
T      P      L      AA    AD    Total 
0.0 0.0 0.0 10.0 0.0 10.0

Alumn: Being able to find high quality information about malware. Learning how to filter relevant information. Being able to correctly cite the information sources used.

Goals:

Contents
  • 4. Security in operating systems
Development of item 6. Security applications.
T      P      L      AA    AD    Total 
6.0 0.0 0.0 6.0 0.0 12.0

Alumn: Learning the concepts and objectives associated with this item.

Goals:

Contents
  • 6. Security in applications
Second theory exam
T      P      L      AA    AD    Total 
1.0 - - 4.0 - 5.0

Theory exam of the following topics: Security in operating systems and Security in computer networks

Week 11
Type of exam: Theory exam

Goals:
Development issue 7. Security forensics.
T      P      L      AA    AD    Total 
3.0 0.0 0.0 3.0 0.0 6.0

Alumn: Learning the concepts and objectives associated with this item.

Goals:

Contents
  • 7. Forensic Security
Final exam lab
T      P      L      AA    AD    Total 
- - 1.0 2.0 - 3.0

Review on all laboratory practices carried out throughout the course.

Week 12
Type of exam: Laboratory exam

Goals:
Third theory Exam
T      P      L      AA    AD    Total 
2.0 - - 8.0 - 10.0

Theory exam of the following topics: Computer Forensics and Security in computer networks

Week 14
Type of exam: Theory exam

Goals:
Total per type
T      P      L      AA    AD    Total 
47.0 0.0 15.0 84.0 4.0 150.0

Teaching methods

This course should give an overview and a technical view of the problems and possible solutions to computer systems and networks security. For this reason, it covers many topics and has a great descriptive component.

However, the teaching methodology will use examples and problems for introducing the concepts to which students attain the necessary skills. Also, we will try to encourage interactivity with students considering real situations in class to discuss possible solutions.

Moreover, the laboratory will complete the skills and knowledge acquired in theory / problems class.

Assessment

Theory (70%) - Laboratory (25%) - Generic competence (5%).
The laboratory mark is obtained from the grades of each practice (50%) and the laboratory final exam (50%), but taking into account that
the practices, which can be done either at the lab or at home, are mandatory in order to do the laboratory exam.
The theory grade will be the average of three course exams (ET1, ET2 and ET3). In other words, the theory grade will be NT = (ET1+ET2+ET3)/3.
The grade for the generic competence is obtained from the evaluation of the activity "Bibliographic Internet Research and analysis".

Generic competences weight in the evaluation specific part

  • 5.0 % - To plan and use the necessary information for an academic essay (for example, the final project of the grade) using critical reflection about the used information resources. To manage information in a competent, independent and autonomous way. To evaluate the found information and identify its deficiencies.

Basics bibliography

Complementary bibliography

Prior learning

Those obtained at the Operating Systems and Computer Networks subjects.

Knowledge of technical English.

Compartir

 
logo FIB © Barcelona school of informatics - Contact - RSS
This website uses cookies to offer you the best experience and service. If you continue browsing, it is understood that you accept our cookies policy.
Classic version Mobile version