Person in charge: | (-) |
Others: | (-) |
Credits | Dept. |
---|---|
7.5 (6.0 ECTS) | AC |
Person in charge: | (-) |
Others: | (-) |
This subject aims to cover the various facets of computer security, including evaluation, network protection, security protocols and architectures and their implementation in e-commerce.
Estimated time (hours):
T | P | L | Alt | Ext. L | Stu | A. time |
Theory | Problems | Laboratory | Other activities | External Laboratory | Study | Additional time |
|
T | P | L | Alt | Ext. L | Stu | A. time | Total | ||
---|---|---|---|---|---|---|---|---|---|---|
12,0 | 0 | 8,0 | 0 | 8,0 | 12,0 | 0 | 40,0 | |||
1. Threats, security services and implementation mechanisms. 2. IP v4 security: SSL/TLS and IP v6: IPsec protocols. 3. Public key infrastructure. -Introduction to the issue, concept, and requirements. -Applicable standards: PKIX, ISO, ETSI, IETF, W3C. -Public key certificates: X509 v3 format. Contents. Function. -Certificate management. Revocation. 4. Time-stamping. 5. Virtual Private Networks: VPN. 6. Security in mobile networks.
|
|
T | P | L | Alt | Ext. L | Stu | A. time | Total | ||
---|---|---|---|---|---|---|---|---|---|---|
10,0 | 0 | 8,0 | 0 | 6,0 | 10,0 | 0 | 34,0 | |||
1. Perimeter security: firewalls -Filtering rules -Reverse firewall 2. IDS: -Identifying weaknesses -Intrusion Detection System 3. Anti-virus: -Identification patterns -Heuristic Search 4. e-mail filtering: -Anti-virus, -Anti-spam 5. Secure code: differential from harmful code
|
|
T | P | L | Alt | Ext. L | Stu | A. time | Total | ||
---|---|---|---|---|---|---|---|---|---|---|
12,0 | 0 | 6,0 | 0 | 12,0 | 12,0 | 0 | 42,0 | |||
1. Norms for secure e-commerce: ebXML (OASIS) 2. Conventional electronic signature. -Concept and historic development -PKCS-7, CMS, and XML formats. Analysis and functionality supported by: 3. Certification policies and practices, signature, and 4. Case studies: Secure e-mail, Webs, e-commerce, B2B, AAA, IPR.
|
Total per kind | T | P | L | Alt | Ext. L | Stu | A. time | Total |
40,0 | 0 | 24,0 | 0 | 27,0 | 40,0 | 0 | 131,0 | |
Avaluation additional hours | 0 | |||||||
Total work hours for student | 131,0 |
Theory classes will explain the technical differences between the various techniques and security tools.
These theoretical explanations will be supplemented by lab sessions, which will give students the opportunity to use the most common security tools for protecting networks and computing systems.
1. Carrying out complementary activities proposed by theory and laboratory professors, and presenting the resulting reports. Marks will make up 30% of the final grade.
2. An exam will be given on the theoretical part of the course.
Marks will make up 45% of the final grade.
3. Doing the practices and Presentation of documentation arising from lab sessions.
Marks will make up 25% of the final grade.
(-)