Security

Base Knowledge

Basic knowledge about the operation of operating systems in general and the TCP/IP protocol stack in particular. Ability to develop TCP and UDP applications. This knowledge is covered in the Operating Systems (OS) and Introduction to Communication Networks (IRC)  courses.

Teaching Methodologies

Exposition of computer security theory, its concepts and principles within the scope of theoretical classes, using audiovisual approaches.
Consolidation of acquired knowledge with practical application in the context of network topologies that allows the resolution of practical security problems, stimulating curiosity and motivation for the topics under discussion.

Learning Results

Fundamental security aspects will be analysed in this course unit, targeting the information systems and communications, in terms of models, risk assessments, politics and existing technologies. It’s the aim of this course, additionally, that students acquire practical skills in defining, planning and implementing security politics. This course unit uses most of the curricular program of the source Cisco Certified Network Associate Security (CCNA Security) that is actually in the scope of the Cisco Academy of the DEIS/ISEC.

Program

Security vulnerabilities in communication and information systems
Technologies and mechanisms of encryption
Secure communication protocols
Technologies and mechanisms of authentication
Access control devices (firewall, IDS, IPS)

Curricular Unit Teachers

Internship(s)

NAO

Bibliography

   Denise Helfrich, Lou Ronnau, Jason Frazier, Paul Forbes, “Cisco network admission control”, VolI/II, Cisco Press, 2007, ISBN 1-58705-241-5, 1A-6-172 (ISEC)

   Amâncio Santos, José Marinho, José Rosado, Luís Santos, ” CCNA 4: Acesso às redes WAN”, 2008, 1A-6-193 (ISEC)

   Luís Santos, diapositivos e demais recursos : https://moodle.isec.pt/;

   Yusuf Bhaiji, “Network security technologies and solutions”, Cisco Press, 2008, ISBN 978-1-58705-246-0, 1A-6-183 (ISEC);

   André Zúquete, “Segurança em Redes Informáticas”, 2ª edição, FCA, 2008, ISBN 978-972-722-565-1 1A-6-138 (ISEC);

   Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, “Handbook of Applied Cryptography”, ISBN: 0-8493-8523-7, CRC-Press, 1997, (disponível on-line) http://www.cacr.math.uwaterloo.ca/hac/

   Roberta Bragg, Mark Rhodes-Ousley, Keith Strassberg, “Network security : the complete reference”, McGrw-Hill/Osborne, 2004, ISBN 0-07-222697-8, 1A-6-180 (ISEC);

   Bob Vachon, Rick Graziani,” Accessing the WAN : CCNA exploration companion guide”, Cisco Press, 2008, ISBN 978-1-58713-205-6, 1A-6-181 (ISEC), 1A-6-181CD (ISEC);

   John Rullan, “Accessing the WAN : CCNA exploration labs and study guide”, Cisco Press, 2008, ISBN 978-1-58713-201-8, 1A-6-174 (ISEC), 1A-6-174CD (ISEC);