Educational guide
IDENTIFYING DATA 2024_25
Subject COMPUTER SECURITY Code 00709026
Study programme
0709 - GRADO EN INGENIERÍA INFORMÁTICA
Descriptors Credit. Type Year Period
6 Compulsory Third Second
Language
Castellano
Prerequisites
Department MATEMATICAS
Coordinador
PISABARRO MANTECA , MARÍA JESÚS
E-mail mjpism@unileon.es
hdiem@unileon.es
Lecturers
DÍEZ MACHÍO , HÉCTOR
PISABARRO MANTECA , MARÍA JESÚS
Web http://
General description
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Presidente MATEMATICAS GRANJA BARON , ANGEL
Secretario MATEMATICAS LOPEZ CABECEIRA , MONTSERRAT
Vocal MATEMATICAS CARRIEGOS VIEIRA , MIGUEL
Tribunal suplente
Cargo Departamento Profesor
Presidente MATEMATICAS GOMEZ PEREZ , JAVIER
Secretario MATEMATICAS MAZCUñAN NAVARRO , EVA MARIA
Vocal MATEMATICAS RODRIGUEZ SANCHEZ , CRISTINA

Competencias
Code  
A18119
A18124
B5618
B5619
B5623
B5624
B5625
B5627
C2 CMECES2 That students know how to apply their knowledge to their work or vocation in a professional manner and possess the skills that are usually demonstrated through the development and defense of arguments and the resolution of problems within their area of study.
C4 CMECES4 That students can transmit information, ideas, problems and solutions to both a specialised and non-specialised audience

Learning aims
Competences
A18119
A18124
B5618
B5619
B5623
B5624
B5625
C2
C4
A18119
A18124
B5618
B5619
B5623
B5624
B5625
B5627
C2
C4
A18119
A18124
B5618
B5619
B5623
B5624
B5625
B5627
C2
C4
A18119
A18124
B5618
B5619
B5623
B5624
B5625
C2
C4
A18119
A18124
B5618
B5619
B5623
B5624
B5625
C2
C4

Contents
Topic Sub-topic
Part I: INFORMATION AND CODING THEORY 1. INTRODUCTION TO INFORMATION THEORY: DATA COMPRESSION.
Information source and entropy. Shannon's Theorem and optimal codes.
2. INTRODUCTION TO ERROR-CORRECTING CODES: LINEAR CODES.
Unreliable channel: errors and deletions. Linear codes: Hamming distance, coding and corrector.
Part II: CRYPTOGRAPHIC SYSTEMS 1.SYMMETRIC CRYPTOSYSTEMS.
General aspects of private-key cryptographic systems. Analysis of basic private-key techniques: implementation and cryptanalysis.
2. ASYMMETRIC CRYPTOSYSTEMS.
General aspects of public-key cryptographic systems. Analysis of basic public-key techniques: implementation and cryptanalysis. Post-quantum cryptography.
3. AUTHENTICATION AND DIGITAL SIGNATURE.
Cryptographic mechanisms for the authentication of messages and users. Hash functions and digital signature.
Part III: COMPUTER SYSTEMS SECURITY 1. SECURITY IN PUBLIC NETWORKS.
Security of information traffic over public networks: analysis of the coding and encryption techniques of some security protocol.
2. INTRUSION.
Nature of the different attacks. Strategies aimed at prevention and detection.
3. LEGAL ASPECTS.

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Problem solving, classroom exercises 15 15 30
 
Practicals using information and communication technologies (ICTs) in computer rooms 24 24 48
 
Lecture 15 15 30
 
Mixed tests 3 18 21
3 18 21
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Problem solving, classroom exercises
Practicals using information and communication technologies (ICTs) in computer rooms
Lecture

Personalized attention
 
Lecture
Problem solving, classroom exercises
Practicals using information and communication technologies (ICTs) in computer rooms
Description
To request a tutoring session, the student must send an email to the teacher.

Assessment
  Description Qualification
Practicals using information and communication technologies (ICTs) in computer rooms 30%
Mixed tests 50%
Works and presentation 20%
 
Other comments and second call

Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic Carlos Munuera y Juan Tena, Codificación de la información, Universidad de Valladolid, 1997
San Ling and Chaoping Xing, Coding theory. A first course, Cambridge University Press, 2004
Manuel José Lucena López, Criptografía y Seguridad de Computadores, http://criptografiayseguridad.blogspot.com/p/criptografia-y-seguridad-en.html, 2022
William Stallings, Cryptography and network security: principles and practice, Seventh edition, Pearson, 2016
Stuart Jacobs, Engineering Information Security. Second Edition, IEEE Press, 2011
William Stallings, Fundamentos de Seguridad en Redes. Aplicaciones y Estándares. 2ª edición, Pearson. Prentice_Hall, 2003
A.J. Menezes; P.C. van Oorschot; S.A. Vanstone , Handbook of applied cryptography (web del libro), https://cacr.uwaterloo.ca/hac/, 1996
Pino Caballero Gil, Introducción a la Criptografía. 2ª edición actualizada, Ra_Ma, 2002
Johannes Buchmann, Introduction to cryptography. Second Edition, Springer, 2004
William Stallings, Network and Internetwork Security: principles and practice, Prentice_Hall, 1995
Charles P. PFleeger; Shari Lawrence Pfleeger; Jonathan Margulies, Security in Computing. Fifth edition, Prentice-Hall, 2015
José M. Huidobro Moya y David Roldán Martínez, Seguridad en Redes y Sistemas Informáticos, Thomson-Paraninfo , 2005
Fuster, A. y otros, Técnicas criptográficas de protección de datos. 2ª edición actualizada, Ra-Ma, 2000

Complementary


Recommendations


Subjects that it is recommended to have taken before
DISCRETE MATHEMATICS / 00709002
ALGEBRA / 00709006
NUMERICAL AND ESTATISTICAL METHODS / 00709007
COMPUTER PROGRAMMING I / 00709009
COMPUTER PROGRAMMING II / 00709011
ALGORITHMS AND GRAPHS / 00709102