Teaching Methodologies
The teaching of the curricular unit will be divided into three parts: a theoretical part with the exhibition and explanation of the theoretical foundations, a practical part with resolution of exercises, and a laboratory part with the use of equipment and software that consolidates the learning results.
Learning Results
Study of the main mechanisms, technologies and security tools that allow the analysis and resolution of problems related to the security of information systems. The student will acquire the ability to define and implement security policies in organizations, perform security monitoring and audittasks. These will protect the organization from both external attacks and attacks carried out from the network itself. At the same time, they will allow reliable remote access to both branches of the organization and mobile workers of the organization.
Program
Security concepts. Definition and implementation of Security Policies in information systems. Modern security threats. Types of malware and attacks. Encryption tools. Modern cryptography. Asymmetric encryption. Management of public keys (types of distribution, digital certification , PKI). Integrity control algorithms and techniques. Algorithms and techniques of authentication and non-repudiation. Access control techniques. Software security techniques. Database security techniques. Trade Security and Electronic Transactions. Operating system security. Audit techniques. Intrusion detection and prevention technique..
Curricular Unit Teachers
Internship(s)
NAO
Bibliography
A. Zúquete, “Segurança em Redes Informáticas”, 4.ª Edição Aumentada, FCA, 2013
M. Correia and P. Sousa, “Seguraça no software”, 2.ª Edição Aumentada, FCA, 2017
J. Granjal, “Segurança Prática em Sistemas e Redes com Linux”, 1.ª Edição, FCA, 2017
O. Santos, J. Stuppi, “CCNA Security 210-260 Official Cert Guide”, Cisco Press, 2015
W. Stallings, “Network Security Essentials: Applications and Standards”, 6th Edition, Pearson, 2016
W. Stallings, “Cryptography and Network Security”, 7th Edition, Pearson, 2016
J. Granjal, “Gestão de Sistemas e Redes em Linux”, 3.ª Edição, FCA, 2013