Information Systems Security

Teaching Methodologies

The teaching of the curricular unit will be divided into three parts: a theoretical part with the exhibition and explanation of the theoretical foundations, a practical part with resolution of exercises, and a laboratory part with the use of equipment and software that consolidates the learning results.

Learning Results

Study of the main mechanisms, technologies and security tools that allow the analysis and resolution of problems related to the security of information systems. The student will acquire the ability to define and implement security policies in organizations, perform security monitoring and audittasks. These will protect the organization from both external attacks and attacks carried out from the network itself. At the same time, they will allow reliable remote access to both branches of the organization and mobile workers of the organization.

Program

Security concepts. Definition and implementation of Security Policies in information systems. Modern security threats. Types of malware and attacks. Encryption tools. Modern cryptography. Asymmetric encryption. Management of public keys (types of distribution, digital certification , PKI). Integrity control algorithms and techniques. Algorithms and techniques of authentication and non-repudiation. Access control techniques. Software security techniques. Database security techniques. Trade Security and Electronic Transactions. Operating system security. Audit techniques. Intrusion detection and prevention technique..

Curricular Unit Teachers

Internship(s)

NAO

Bibliography

A. Zúquete, “Segurança em Redes Informáticas”, 4.ª Edição Aumentada, FCA, 2013

M. Correia and P. Sousa, “Seguraça no software”, 2.ª Edição Aumentada, FCA, 2017

J. Granjal, “Segurança Prática em Sistemas e Redes com Linux”, 1.ª Edição, FCA, 2017

O. Santos, J. Stuppi, “CCNA Security 210-260 Official Cert Guide”, Cisco Press, 2015

W. Stallings, “Network Security Essentials: Applications and Standards”, 6th Edition, Pearson, 2016

W. Stallings, “Cryptography and Network Security”, 7th Edition, Pearson, 2016

J. Granjal, “Gestão de Sistemas e Redes em Linux”, 3.ª Edição, FCA, 2013