Educational guide
IDENTIFYING DATA 2024_25
Subject SECURITY IN COMMUNICATION NETWORKS Code 00709030
Study programme
0709 - GRADO EN INGENIERÍA INFORMÁTICA
Descriptors Credit. Type Year Period
6 Optional Third Second
Language
Castellano
Prerequisites
Department ING.ELECTR.DE SIST. Y AUTOMATI
Coordinador
GARCÍA RODRÍGUEZ , ISAÍAS
E-mail igarr@unileon.es
mcbenc@unileon.es
javem@unileon.es
Lecturers
BENAVIDES CUÉLLAR , MARÍA DEL CARMEN
GARCÍA RODRÍGUEZ , ISAÍAS
AVELEIRA MATA , JOSE ANTONIO
Web http://agora.unileon.es
General description The student will learn about the different threats that can be faced in a communication network, stressing the case of Internet. This study will be achieved by means of different security models. The student will also gain skills neccesary to know, configure, manage and use different security tools.
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Presidente ING.ELECTR.DE SIST. Y AUTOMATI DIEZ DIEZ , ANGELA
Secretario ING.ELECTR.DE SIST. Y AUTOMATI FERNANDEZ LOPEZ , CARLOS
Vocal ING.ELECTR.DE SIST. Y AUTOMATI PEREZ LOPEZ , DANIEL
Tribunal suplente
Cargo Departamento Profesor
Presidente ING.ELECTR.DE SIST. Y AUTOMATI FOCES MORAN , JOSE MARIA
Secretario ING.ELECTR.DE SIST. Y AUTOMATI ALAIZ RODRIGUEZ , ROCIO
Vocal ING.ELECTR.DE SIST. Y AUTOMATI ALEGRE GUTIERREZ , ENRIQUE

Competencias
Code  
A18115
A18129
B5613
B5623
B5626
C5 CMECES5 That students have developed those learning skills necessary to undertake further studies with a high degree of autonomy

Learning aims
Competences
Knowing how to manage security in communication networks. Understanding the functional aspects of security in communication networks. Knowing and being able to apply techniques for the detection and mitigation of the main security problems and malicious attacks on networked data infrastructures. Knowledge about the design and administration of security systems for networked data services. A18115
A18129
B5613
B5623
B5626
C5

Contents
Topic Sub-topic
MODULE I: INTRODUCTION Topic I. INTRODUCTION TO NETWORK SECURITY
Network security concept. General considerations.

Topic II. BASIC FUNCTIONALITIES
Confidentiality, Integrity, Availability, Authentication, Authorization, Accounting, Non-repudiation. Basic techniques.

Topic III. SOCIAL ENGINEERING
Introduction. Social engineering techniques. Software for social engineering.
MODULE II: NETWORK MANAGEMENT Topic 1 INTRODUCTION.
Introduction to network management. Functional areas of network management. Tools for network management. Architecture of a network management system.

Topic 2 NETWORK MANAGEMENT ON THE INTERNET. SNMP
Introduction. Information Model. Communication Model.

Topic 3. TOOLS
NAGIOS, ZABBIX, MIB Browser. getif.
MODULE III: VULNERABILITIES AND PROTECTIONS IN TCP/IP LAYERS Topic 1. VULNERABILITIES AND PROTECTIONS IN THE APPLICATION LAYER.
Introduction. Remote connection service. File transfer service. Email service. Domain name service. Web service.

Topic 2. VULNERABILITIES AND PROTECTIONS IN THE TRANSPORT LAYER.
Introduction. UDP and TCP protocols. Scanning and fingerprinting with TCP flags.

Topic 3. VULNERABILITIES AND PROTECTIONS IN THE NETWORK LAYER.
Introduction. IP protocol. IPsec.

Topic 4. PERIMETER SECURITY AND INTRUSION DETECTION.
Introduction. Firewalls. Intrusion detection and prevention systems.

Topic 5. VULNERABILITIES AND PROTECTIONS IN THE LINK LAYER.
Introduction. Attacks on ARP. Attacks on switches.

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Personal tuition 2 0 2
 
Laboratory practicals 30 39 69
Problem solving, classroom exercises 4 4 8
 
Lecture 26 39 65
 
Mixed tests 6 0 6
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Personal tuition Time reserved to address and resolve students' questions.
Laboratory practicals Practical application of the contents covered in the lecture sessions.
Problem solving, classroom exercises Formulation, analysis, and resolution of exercises.
Lecture Presentation of the course content.

Personalized attention
 
Personal tuition
Description
Resolution of doubts individually or in groups and in person. Tutoring sessions will be arranged in advance with the teacher.

Assessment
  Description Qualification
Laboratory practicals Correct completion of laboratory practices will be valued.


25%
Mixed tests The content corresponding to the lecture sessions and laboratory practices will be evaluated through various mixed-type tests (short questions, multiple choice, development, etc.) that will be distributed throughout the course. 75%
Others To pass the subject through continuous assessment, a minimum score of 4 out of 10 is required in both practical and theoretical parts.
----------------------------------
Inappropriate behavior in the classroom, laboratory, or evaluation tests will be penalized with up to a 20% reduction in the final grade.
 
Other comments and second call
In the extraordinary call, a test will be conducted to assess the theoretical and practical competencies acquired by the student.

EVALUATION TESTS

During the evaluation tests, the use of any materials or devices not expressly authorized by the teacher will not be possible.

In the event of any irregularity during the conduct of the exam or corresponding evaluation test, the exam will be immediately withdrawn, the student expelled, and marked as failed. In any case, the internal regulations of the ULE contained in the document "Guidelines for action in cases of plagiarism, copying, or fraud in exams or evaluation tests" (Approved by the Permanent Commission of the Governing Council on 29/01/2015) will be adhered to.

Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic , Intrusion Detection Systems with Snort, O'Reilly Media, 2004
Rafeeq Ur Rehman, Intrusion Detection Systems with Snort. Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID, Prentice Hall,
John A. Vacca, Network and system security, Syngress, 2010
Chris Fry and Martin Nystrom, Security Monitoring, O'Reilly, 2009
Richard Bejtlich, The Tao of Network Security Monitoring Beyond Intrusion Detection, Addison Wesley, 2004

Complementary Omar Santos, End-to-End Network Security Defense-in-Depth, Cisco Press, 2008
Stuart McClure, Joel Scambray, and George Kurtz, Hacking Exposed: Network Security Secrets and Solutions, , 2009
Nitesh Dhanjani, Billy Rios, and Brett Hardin, Hacking: The Next Generation (Animal Guide), O´Reilly, 2009
Eric Cole, Network Security Bible, Wiley, 2009
Gordon Fyodor Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, , 2009
Eric Seagren, Secure Your Network for Free, Syngress, 2007


Recommendations


Subjects that it is recommended to have taken before
COMPUTER NETWORKS ARCHITECTURE, DESIGN AND MANAGEMENT / 00709019