Computer Security

Teaching Methodologies

Classes are taught on a theoretical-practical basis, comprising the theoretical exposition of concepts and the demonstration of their application, using computers and digital tools, in a dynamic teaching-learning process, fundamentally interactive, appealing to the development of the student’s critical sense.

A “Blended learning” model will be used, centred on the student, based on the development of activities and with classes entirely dedicated to the practical application of concepts and the carrying out of exercises.

Learning Results

The curricular unit has as main goal to give students knowledge and to develop skills in the computer security area. In addition to the understanding of the basics, it is intended that the students acquire knowledge about the techniques and technology that can be used to implement security solutions in IT systems and also that they develop the following fundamental skills:

  • • To understand the main concepts related with computer security and cybersecurity.
  • • To understand the fundamental notions of cryptography and the main protocols.
  • • To apply the cryptography concepts in the adequate configuration of the Internet services.
  • • To use filtering applications of packages and attacks’ detection.
  • • To elaborate technical reports about computer security solutions.
  • • To understand the issues related with the need of awareness of the computer security and cybersecurity.

To understand the issues related with ethics in computer security.

Program

1. Introduction to computer security

Fundamental concepts

Threads and attacks

Fundamental security principles

2. Network security

Fundamental concepts

Generic model of networks’ security

Applications of injection and capture of packages in a computers’ network

3. Cryptographic tools

Introduction

Symmetric encryption

Message authentication and hash functions

Asymmetric encryption

Digital signatures and key management

Practical applications

4. User authentication

Principles of electronic authentication

Types of authentication

Remote authentication

5. Computer security auditing

Architecture

Systems activity log

Identification of vulnerabilities

6. Malicious Software

Types of malicious software

APTs

Propagation, activation and execution

Countermeasures

7. Intrusion Detection Systems

Concepts and fundamentals

Classification of approaches

HIDS and NIDS

Evaluation metrics

8. The human factor and ethics

Current state of cybersecurity

Taxonomy and legislation

Good practices

Internship(s)

NAO

Bibliography

Principal:

– W. Stallings, L. Brown (2024), Computer Security: Principles and Practice, 5th Ed, ISBN: 978-0138091675, Pearson.

– W. Stallings (2022), Cryptography and Network Security: Principles and Practice, Global Ed, 8th Ed., ISBN: 978-1292437484, Pearson.

– W. Stallings, Network Security Essentials (2016): Applications and Standards, 6th Ed., ISBN: 978 0134527338, Pearson.

Secundária:

– A. Zuquete (2021), Segurança em Redes Informáticas, 6ª Ed., ISBN: ISBN:  978-9727229239, FCA.- J. Granjal (2017), Segurança prática em sistemas e redes com Linux, ISBN: 978-9727228652, FCA.

– M. Antunes, B. Rodrigues (2022), Introdução à cibersegurança, 2ª Ed., ISBN: 978-9727229246, FCA.