Educational guide
IDENTIFYING DATA 2024_25
Subject NETWORK DATA SECURITY Code 00717027
Study programme
0717 - GRADO INGENIERÍA DATOS INTELIGENCIA ARTIFICIAL
Descriptors Credit. Type Year Period
6 Compulsory Third Second
Language
Prerequisites
Department ING.ELECTR.DE SIST. Y AUTOMATI
Coordinador
ALAIZ MORETÓN , HÉCTOR
E-mail halam@unileon.es
mcbenc@unileon.es
Lecturers
ALAIZ MORETÓN , HÉCTOR
BENAVIDES CUÉLLAR , MARÍA DEL CARMEN
Web http://agora.unileon.es
General description This course teaches students to create robust security solutions to protect data processing systems and communication networks. Through practical and theoretical methods, students will learn to strengthen information security against modern threats.
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Presidente ING.ELECTR.DE SIST. Y AUTOMATI FUERTES MARTINEZ , JUAN JOSE
Secretario ING.ELECTR.DE SIST. Y AUTOMATI PEREZ LOPEZ , DANIEL
Vocal ING.ELECTR.DE SIST. Y AUTOMATI PRADA MEDRANO , MIGUEL ANGEL
Tribunal suplente
Cargo Departamento Profesor
Presidente ING.ELECTR.DE SIST. Y AUTOMATI ALONSO CASTRO , SERAFIN
Secretario ING.ELECTR.DE SIST. Y AUTOMATI FOCES MORAN , JOSE MARIA
Vocal ING.ELECTR.DE SIST. Y AUTOMATI FIDALGO FERNANDEZ , EDUARDO

Competencias
Code  
A18975
A18985
B5800
B5806
B5809
B5813
C4 CMECES4 That students can transmit information, ideas, problems and solutions to both a specialised and non-specialised audience
C5 CMECES5 That students have developed those learning skills necessary to undertake further studies with a high degree of autonomy

Learning aims
Competences
Knows how to design and implement security solutions that guarantee the confidentiality, integrity, availability and authenticity of data processing systems in a network ecosystem. A18975
B5800
B5806
B5809
B5813
C4
C5
Knows how to design and implement security solutions that guarantee the confidentiality, integrity, availability and authenticity of data processing systems in a network ecosystem. Know the standards, regulations and legal framework applicable to the design and management of secure network data services. A18985
B5800
B5806
B5813
C5

Contents
Topic Sub-topic
BLOCK I. INTRODUCTION TO CYBERSECURITY, FUNCTIONAL AREAS. TOPIC 1. BASIC CONCEPTS AND FUNCTIONALITIES OF CYBERSECURITY.
TOPIC 2: FUNCTIONAL AREAS OF CYBERSECURITY.
TOPIC 3: FUNDAMENTAL TOOLS FOR CYBERSECURITY.
BLOCK II: DATA PRIVACY IN NETWORK ENVIRONMENTS. Topic 1: DEFINITION AND PRINCIPLES OF CYBERSECURITY.
Topic 2: FUNCTIONAL AREAS OF CYBERSECURITY.
Topic 3: CURRENT CHALLENGES AND TRENDS.
BLOCK III: Security and trust in data access, exchange and analysis. Topic 1: IDENTITY AND ACCESS MANAGEMENT.
Topic 2: SECURITY IN DATA EXCHANGE.
Topic 3: TRUST AND CYBERSECURITY.
Topic 4: SECURITY CONSIDERATIONS FOR DATA ANALYSIS
BLOCK IV: STANDARDS, REGULATIONS AND APPLICABLE LEGAL FRAMEWORK. Topic 1: IDENTITY AND ACCESS MANAGEMENT.
Topic 2: SECURITY IN DATA EXCHANGE.
Topic 3: TRUST AND CYBERSECURITY.
Topic 4: SECURITY CONSIDERATIONS FOR DATA ANALYSIS.
BLOCK V: DATA ANALYSIS TECHNIQUES IN CYBERSECURITY AND CYBERINTELLIGENCE. Topic 1: DIGITAL FORENSIC ANALYSIS.
Topic 2: DETECTION OF ANOMALIES AND ATTACK PATTERNS.
Topic 3: CYBER INTELLIGENCE.
Topic 4: SECURITY ANALYSIS TOOLS AND PLATFORMS.

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
PBL (Problem Based Learning) 8 0 8
 
Laboratory practicals 28 42 70
Personal tuition 3.5 0 3.5
 
Lecture 25 37.5 62.5
 
Mixed tests 6 0 6
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
PBL (Problem Based Learning) Problem formulation and discussion.
Laboratory practicals Practical implementation of the contents covered in the master sessions.
Personal tuition Time reserved to answer and resolve students' doubts. Individually.
Lecture Presentation of the contents of the subject.

Personalized attention
 
Personal tuition
Description
In English, that would be: "Resolution of doubts individually or in groups and in person. Tutoring sessions will be arranged in advance with the teacher.

Assessment
  Description Qualification
Laboratory practicals The correct performance of the practices in the laboratory will be assessed. 25%
PBL (Problem Based Learning) Completion and quality of documentation of related problem-based learning activities will be assessed. 10%
Mixed tests Questionnaires about master sessions. 40%
Others To pass through continuous evaluation, you must obtain at least a 4 out of 10 in each evaluated test.

_________________________________
Inappropriate attitude in the classroom, laboratory or evaluation tests will be penalized with 20% of the final grade.
 
Other comments and second call

In the extraordinary call, a test will be carried out that evaluates the theoretical and practical skills acquired by the student (70%) and the quality of the memory and the presentation of the work, if any, will be evaluated (30%).

EVALUATION TESTS

During the evaluation tests, it will not be possible to use any material or device that has not been expressly authorized by the teacher.

If any irregularity occurs during the corresponding exam or evaluation test, the exam will be immediately withdrawn, the student will be expelled and graded as a fail. In any case, the provisions of the internal regulations of the ULE included in the document "Guidelines for action in cases of plagiarism, copying or fraud in exams or evaluation tests" will be followed (Approved Permanent Commission of the Government Council 01/29 /2015).


Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic , Intrusion Detection Systems with Snort, O'Reilly, 2004
Rafeeq Ur Rehman, Intrusion Detection Systems with Snort. Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID, Pretice Hall , 2010
John A. Vacca, Network and system security, Syngress, 2010
Chris Fry and Martin Nystrom, Security Monitoring, O'Reilly,
Richard Bejtlich, The Tao of Network Security Monitoring Beyond Intrusion Detection, Addison Wesley, 2004

Complementary


Recommendations


Subjects that it is recommended to have taken before
COMPUTER NETWORKS / 00717025