Educational guide
IDENTIFYING DATA 2024_25
Subject INFORMATION SECURITY Code 00715005
Study programme
0715 - MASTER UNIV. INGENIERIA INFORMATICA
Descriptors Credit. Type Year Period
6 Compulsory First First
Language
Castellano
Prerequisites
Department ING.MECANICA,INFORMAT.AEROESP.
Coordinador
CAMPAZAS VEGA , ADRIAN
E-mail acamv@unileon.es
agueh@unileon.es
Lecturers
CAMPAZAS VEGA , ADRIAN
GUERRERO HIGUERAS , ANGEL MANUEL
Web http://agora.unileon.es
General description
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Presidente ING.MECANICA,INFORMAT.AEROESP. MATELLAN OLIVERA , VICENTE
Secretario ING.MECANICA,INFORMAT.AEROESP. SANCHEZ GONZALEZ , LIDIA
Vocal ING.MECANICA,INFORMAT.AEROESP. PANIZO ALONSO , LUIS
Tribunal suplente
Cargo Departamento Profesor
Presidente CONDE GONZALEZ , MIGUEL ANGEL
Secretario ING.MECANICA,INFORMAT.AEROESP. RODRIGUEZ LERA , FRANCISCO JAVIER
Vocal ING.MECANICA,INFORMAT.AEROESP. FERNANDEZ LLAMAS , CAMINO

Competencies
Type A Code Competences Specific
  A13232
  A13254
Type B Code Competences Transversal
  B3067
  B3089
  B3095
  B3097
  B3098
  B3100
Type C Code Competences Nuclear

Learning aims
Competences
The student has the ability to design, develop, manage and evaluate mechanisms for certification and security assurance in the processing and access to information in a local or distributed processing system. A13232
A13254
B3067
B3089
B3095
B3097
B3098
B3100

Contents
Topic Sub-topic
Block I: INTRODUCTION AND PREVIOUS CONCEPTS Topic 1: IS FUNDAMENTALS.
Introduction to Information Security. Authentication systems. Audit of passwords.
Block II: RISK ANALYSIS AND MANAGEMENT. Topic 1: RISK ANALYSIS AND MANAGEMENT.
IS Management Systems (ISMS). Audit and security in networks and systems. Vulnerability auditing.

Topic 2: NETWORK SECURITY.
Specification of security policies and anonymity. Prevention mechanisms. Security in Wifi networks.

Topic 3: IT SECURITY.
Application security auditing. Information Security Management Systems. Risk analysis. Points of view of the Organization and Technology. Regulatory Framework. Legislative Framework.

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Practicals using information and communication technologies (ICTs) in computer rooms 23 63 86
 
Personal tuition 6 0 6
 
Lecture 26 27 53
 
Mixed tests 5 0 5
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Practicals using information and communication technologies (ICTs) in computer rooms
Personal tuition
Lecture

Personalized attention
 
Lecture
Practicals using information and communication technologies (ICTs) in computer rooms
Personal tuition
Description
Tutorials will be arranged with students after contact with the teacher.

Assessment
  Description Qualification
Mixed tests
 
Other comments and second call

For those students who have not been able to attend class on a regular basis, a final evaluation will be conducted, if possible in front of the computer, to establish the level of skills acquired. This will have a relative value of 50%, being able to complete 100% with the delivery of tasks that throughout the term and through the teaching support platform agora.unileon.es the student has done.

2. BEHAVIOR IN THE EXAM:

During the evaluation tests it is strictly forbidden the possession and use of materials other than those explicitly approved for the development of the same. In general, the only material allowed will be pens, pencils and erasers. In particular, the possession and use of notes, books, folders and electronic devices is prohibited. Failure to comply with these rules will result in immediate withdrawal from the exam, expulsion from the exam and a failing grade. Likewise, the guidelines for action in cases of plagiarism, copying or fraud in exams or evaluation tests of the University of León will apply.

If during the correction of the exams or papers, in the opinion of the professor, plagiarism, copying or fraud has occurred, the above guidelines will also apply.




3. EVALUATION:

Spelling mistakes in the practical activities and evaluation tests will be negatively evaluated.

If the teacher considers that in the set of tests performed one or more have been performed in an outstanding manner may increase the final grade of the student the points it deems reasonable.

If the teacher considers that one or more of the tests taken as a whole have been performed very poorly, or not presented, he/she may decrease the student's final grade by the points he/she considers reasonable.

If any of the errors committed in any of the tests constitutes a serious misconception, the final grade of failing will be 0.0.

Passing the course will require passing each of the evaluation tests with a minimum grade. Unless expressly indicated, this minimum grade will be 4.0.

Works and expositions in class: The evaluation of each practice will be made on a report that the groups will deliver at the end of the same one. The purpose of the evaluation of each practical is to assess the degree of knowledge and skills of the student in the competences indicated in this descriptive sheet. In particular, the functional capacity of the required deliverable may be assessed.

Evaluation of theoretical knowledge, evaluation of skills and practical knowledge, and resolution of problems and cases that will bring together a series of questions on the program of the subject.


Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic Caloyannides, Privacy protection and computer forensics, Artech house, 2ª ed.

Complementary


Recommendations


 
Other comments
In the development of the course, the student must avoid behaviors that in the opinion of the teacher are undesirable, and may be expelled from the activity otherwise. Without being exhaustive, this includes violent, sexist, homophobic, xenophobic, unhygienic behaviors, improper use of electronic devices and talks not related to the subject. In particular, the making of unauthorized recordings is strictly forbidden.