Information Tecnology Security
2nd Cycle Studies - Mestrado
BSc in Informatics Engineering or equivalent.
Lecture classes (T): presentation and discussion around the topics of the course.
Lab classes (PL): application of theoretical concepts in projects.
The MSI theoretical classes will take place, preferably, Friday afternoon and Saturday morning. Theoretical classes will also be broadcast by teleconference and will be recorded to allow the students to follow the classes remotely.
The practical classes will be preferably booked Friday morning. The practical assignments may also be developed by the students in remote and asynchronous mode with remote support of teachers.
The main objectives of this course are the following:
- Informatics security
- Network security
- Security of informatics systems
The student will gain knowledge and decision skills in the following areas:
- Security mechanisms and technologies
- Most relevant security tools
- Security in informatics systems
- Security problems resolution in informatics systems
- Definition and implementation of organizational security politics
- Performance of tasks concerning security monitoring and auditing
- Conception and installation of security solutions for informatics networks.
1. Basic information security concepts
2. Security in communication systems
3. Security in information systems
4. Internet security
5. Security in e-commerce and electronic transactions
6. Access control, intrusion detection and prevention
7. Security audits and organizational aspects.
António Jorge da Costa Granjal
Synthesis work: 25.0%
• André Zúquete, Segurança em Redes Informáticas (4ª edição), FCA Editora, 2014.
• Edmundo Monteiro e Fernando Boavida, Engenharia de Redes Informáticas, FCA Editora, 2011 (cap 7)
• Jorge Granjal, Gestão de Sistemas e Redes em Linux, FCA Editora 2013.
• Bruce Schneier, Secrets and Lies: Digital Security in a Networked World, Wiley, 2004.
• William Stallings, Cryptography and Network Security: Principles and Practice (6th edition), Prentice Hall, 2013Alberts, C.J. and Dorofee, A.J., “Managing Information Security Risks: The Octave Approach”, ISBN: 9780321118868, SEI Series in Software Engineering, 2003.