Teaching Methodologies
Classes are taught on a theoretical-practical basis, comprising the theoretical exposition of concepts and the demonstration of their application, using computers and digital tools, in a dynamic teaching-learning process, fundamentally interactive, appealing to the development of the student’s critical sense.
A “Blended learning” model will be used, centred on the student, based on the development of activities and with classes entirely dedicated to the practical application of concepts and the carrying out of exercises.
Learning Results
The curricular unit has as main goal to give students knowledge and to develop skills in the computer security area. In addition to the understanding of the basics, it is intended that the students acquire knowledge about the techniques and technology that can be used to implement security solutions in IT systems and also that they develop the following fundamental skills:
- • To understand the main concepts related with computer security and cybersecurity.
- • To understand the fundamental notions of cryptography and the main protocols.
- • To apply the cryptography concepts in the adequate configuration of the Internet services.
- • To use filtering applications of packages and attacks’ detection.
- • To elaborate technical reports about computer security solutions.
- • To understand the issues related with the need of awareness of the computer security and cybersecurity.
To understand the issues related with ethics in computer security.
Program
1. Introduction to computer security
Fundamental concepts
Threads and attacks
Fundamental security principles
2. Network security
Fundamental concepts
Generic model of networks’ security
Applications of injection and capture of packages in a computers’ network
3. Cryptographic tools
Introduction
Symmetric encryption
Message authentication and hash functions
Asymmetric encryption
Digital signatures and key management
Practical applications
4. User authentication
Principles of electronic authentication
Types of authentication
Remote authentication
5. Computer security auditing
Architecture
Systems activity log
Identification of vulnerabilities
6. Malicious Software
Types of malicious software
APTs
Propagation, activation and execution
Countermeasures
7. Intrusion Detection Systems
Concepts and fundamentals
Classification of approaches
HIDS and NIDS
Evaluation metrics
8. The human factor and ethics
Current state of cybersecurity
Taxonomy and legislation
Good practices
Internship(s)
NAO
Bibliography
Principal:
– W. Stallings, L. Brown (2024), Computer Security: Principles and Practice, 5th Ed, ISBN: 978-0138091675, Pearson.
– W. Stallings (2022), Cryptography and Network Security: Principles and Practice, Global Ed, 8th Ed., ISBN: 978-1292437484, Pearson.
– W. Stallings, Network Security Essentials (2016): Applications and Standards, 6th Ed., ISBN: 978 0134527338, Pearson.
Secundária:
– A. Zuquete (2021), Segurança em Redes Informáticas, 6ª Ed., ISBN: ISBN: 978-9727229239, FCA.- J. Granjal (2017), Segurança prática em sistemas e redes com Linux, ISBN: 978-9727228652, FCA.
– M. Antunes, B. Rodrigues (2022), Introdução à cibersegurança, 2ª Ed., ISBN: 978-9727229246, FCA.