Saltar al contingut Menu
Map
  • Home
  • Information
  • Contact
  • Map

Security in Information Technology Systems (SSI)

Credits Dept.
7.5 (6.0 ECTS) AC

Instructors

Person in charge:  (-)
Others:(-)

General goals

This subject aims to cover the various facets of computer security, including evaluation, network protection, security protocols and architectures and their implementation in e-commerce.

Specific goals

Knowledges

  1. Security evaluation. Risk analysis. Security management.
  2. Basic network security. Threats, services. Public key infrastructure.
  3. Network protection. Perimeter security, IDS, antivirus.
  4. Security in e-Commerce Applications.

Abilities

(no available informacion)

Competences

(no available informacion)

Contents

Estimated time (hours):

T P L Alt Ext. L Stu A. time
Theory Problems Laboratory Other activities External Laboratory Study Additional time

1. Security evaluation.
T      P      L      Alt    Ext. L Stu    A. time Total 
6,0 0 2,0 0 1,0 6,0 0 15,0




1. Security management: BS 7799



2. Security environments and domains



3. Assets and Weaknesses



4. Risk Analysis and Evaluation: Criteria



5. Risk Management:



- MAGERIT, CRAMM



- Security policies



- Contingency plans



- OSSTMM







  • Laboratory
    Familiarisation with CRAMM and MAGERIT risk analysis tools.

2. Basic network security
T      P      L      Alt    Ext. L Stu    A. time Total 
12,0 0 8,0 0 8,0 12,0 0 40,0




1. Threats, security services and implementation mechanisms.



2. IP v4 security: SSL/TLS and IP v6: IPsec protocols.



3. Public key infrastructure.



-Introduction to the issue, concept, and requirements.



-Applicable standards: PKIX, ISO, ETSI, IETF, W3C.



-Public key certificates: X509 v3 format.



Contents. Function.



-Certificate management. Revocation.



4. Time-stamping.



5. Virtual Private Networks: VPN.



6. Security in mobile networks.











  • Laboratory
    Implementing a VPN -
    Implementation of a PKI system (generation and life-cycle management of X.509 certificates)

3. Network protection
T      P      L      Alt    Ext. L Stu    A. time Total 
10,0 0 8,0 0 6,0 10,0 0 34,0




1. Perimeter security: firewalls



-Filtering rules



-Reverse firewall



2. IDS:



-Identifying weaknesses



-Intrusion Detection System



3. Anti-virus:



-Identification patterns



-Heuristic Search



4. e-mail filtering:



-Anti-virus,



-Anti-spam



5. Secure code: differential from harmful code







  • Laboratory
    Configuring a firewall (FW)

    Configuring an Intrusion Detection System (IDS)

    Analysis of virus code

    Study of spam detection systems

4. Security in e-Commerce Applications
T      P      L      Alt    Ext. L Stu    A. time Total 
12,0 0 6,0 0 12,0 12,0 0 42,0




1. Norms for secure e-commerce: ebXML (OASIS)



2. Conventional electronic signature.



-Concept and historic development



-PKCS-7, CMS, and XML formats. Analysis and functionality



supported by:



3. Certification policies and practices, signature, and



4. Case studies: Secure e-mail, Webs, e-commerce, B2B, AAA, IPR.







  • Laboratory
    Integrating an e-signature for an e-commerce application.
    Incorporation of tools providing confidentiality in the management of personal data.


Total per kind T      P      L      Alt    Ext. L Stu    A. time Total 
40,0 0 24,0 0 27,0 40,0 0 131,0
Avaluation additional hours 0
Total work hours for student 131,0

Docent Methodolgy

Theory classes will explain the technical differences between the various techniques and security tools.



These theoretical explanations will be supplemented by lab sessions, which will give students the opportunity to use the most common security tools for protecting networks and computing systems.

Evaluation Methodgy

1. Carrying out complementary activities proposed by theory and laboratory professors, and presenting the resulting reports. Marks will make up 30% of the final grade.

2. An exam will be given on the theoretical part of the course.
Marks will make up 45% of the final grade.

3. Doing the practices and Presentation of documentation arising from lab sessions.
Marks will make up 25% of the final grade.

Basic Bibliography

  • Carlisle Adams, Steve Lloyd Understanding PKI : concepts, standards, and deployment considerations, Addison-Wesley, 2003.
  • Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman Building Internet Firewalls;, O'Reilly & Associates, 2000.
  • Stephen Northcutt ... [et al.] Intrusion signatures and analysis, New Riders, 2001.
  • Simson Garfinkel with Gene Spafford Web security, privacy & commerce, O'Reilly & Associates, 2002.

Complementary Bibliography

  • Rolf Oppliger Secure messaging with PGP and S/MIME, Artech House, 2001.
  • Manuel José Lucena López Criptografía y seguridad en computadores, , 2003.

Web links

  1. http://www.cert.org


  2. http://www.criptored.upm.es/


  3. http://www.computer.org/


  4. http://www.infosecuritymag.com/articles/april00/columns_cryptorhythms.shtml


Previous capacities

(-)


Compartir

 
logo FIB © Barcelona school of informatics - Contact - RSS
This website uses cookies to offer you the best experience and service. If you continue browsing, it is understood that you accept our cookies policy.
Classic version Mobile version