Educational guide | ||||||||||||||||||||||||||||||||||||||||
IDENTIFYING DATA | 2024_25 | |||||||||||||||||||||||||||||||||||||||
Subject | TRUSTWORTHY SYSTEMS | Code | 01747006 | |||||||||||||||||||||||||||||||||||||
Study programme |
|
|||||||||||||||||||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||||||||||||||||||||
5 | Compulsory | First | First |
|||||||||||||||||||||||||||||||||||||
Language |
|
|||||||||||||||||||||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||||||||||||||||||||
Department | ING.MECANICA,INFORMAT.AEROESP. |
|||||||||||||||||||||||||||||||||||||||
Coordinador |
|
calvaa@unileon.es agueh@unileon.es |
||||||||||||||||||||||||||||||||||||||
Lecturers |
|
|||||||||||||||||||||||||||||||||||||||
Web | http://agora.unileon.es | |||||||||||||||||||||||||||||||||||||||
General description | ||||||||||||||||||||||||||||||||||||||||
Tribunales de Revisión |
|
|||||||||||||||||||||||||||||||||||||||
Competencies |
Type A | Code | Competences Specific |
A18793 | ||
A18808 | ||
A18809 | ||
A18811 | ||
Type B | Code | Competences Transversal |
B5729 | ||
B5730 | ||
B5731 | ||
B5732 | ||
B5733 | ||
B5734 | ||
B5735 | ||
B5736 | ||
B5737 | ||
B5738 | ||
B5739 | ||
B5740 | ||
Type C | Code | Competences Nuclear |
C1 | ||
C2 | ||
C3 | ||
C4 | ||
C5 |
Learning aims |
Competences | |||
Management of operating systems in the area of computer and communications security. | A18793 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5736 B5737 B5738 B5739 B5740 |
C1 C2 C3 C4 C5 |
Management of computer networks and services from the point of view of computer and communications security. | A18793 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5736 B5737 B5738 B5739 B5740 |
C1 C2 C3 C4 C5 |
Knowledge about the application of biometric properties in the area of computer and communications security. | A18809 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5736 B5737 B5738 B5739 B5740 |
C1 C2 C3 C4 C5 |
Detection, analysis and prevention of security and technological threats. | A18808 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5736 B5737 B5738 B5739 B5740 |
C1 C2 C3 C4 C5 |
Development of secure network systems. | A18809 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5736 B5737 B5738 B5739 B5740 |
C1 C2 C3 C4 C5 |
Knowledge of security management systems. | A18808 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5736 B5737 B5738 B5739 B5740 |
C1 C2 C3 C4 C5 |
Analysis of the reliability and robustness of complex computer systems. | A18811 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5736 B5737 B5738 B5739 B5740 |
C1 C2 C3 C4 C5 |
Develop security systems in various environments and operating systems. | A18811 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5736 B5737 B5738 B5739 B5740 |
C1 C2 C3 C4 C5 |
Contents |
Topic | Sub-topic |
Part 1: hardening operating systems. | 0.- Basics of security on operating systems. 1.- Handling of the OS's own tools (Linux): basics, administration, task planning, services, system information, automation (shell script), update and application of patches, access control, log management, etc. 2.- Containerization of applications. |
Part 2: hardening computer networks | 0.- Basics of network security and reliability. 1.- Communications encryption. 2.- Filtering of communications. 3.- DMZs. |
Part 3: Reliable Systems Analysis | 1.- Detection of intrusions and vulnerabilities. 2.- Honeypots |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
Practicals using information and communication technologies (ICTs) in computer rooms | 25 | 75 | 100 | ||||||
Lecture | 20 | 0 | 20 | ||||||
Mixed tests | 3 | 0 | 3 | ||||||
Practical tests | 2 | 0 | 2 | ||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
Practicals using information and communication technologies (ICTs) in computer rooms | Practical application of the theoretical concepts using ICTs. |
Lecture | Exposure by the teacher of theoretical, practical, and methodological concepts. The exhibitions may be accompanied by audio-visual material: slides, online video resources. |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Practicals using information and communication technologies (ICTs) in computer rooms | Software development/configuration | 30-70% | |
Lecture | Written exam | 30-70% | |
Others | Optional tests | 0% - 20% | |
Other comments and second call | |||
To pass the course, it will be necessary to obtain a grade of at least 50% of the maximum in both the exam and the practicals.The works and practices presented may be reviewed with an anti-plagiarism computer program that can carry out checks between the works of the students of the current and previous call and against external sources. In the case of plagiarism, the work will be classified as suspended. During the evaluation tests, the use of electronic resources (calculators, tablets, telephones, computers, etc.) will not be possible, except for those tests that, upon the express indication of the teacher, require the use of any of these resources. In the event of any irregularity during the examination or corresponding evaluation test, the exam will be withdrawn immediately, the student will be expelled and the grade will be suspended. In any case, it will comply with the provisions of the internal regulations of the ULe included in the document "Guidelines for action in cases of plagiarism, copying or fraud in exams or evaluation tests" (Approved Standing Committee of the Governing Council 29/01/2015).The assessment of the practices will follow one of the following criteria (optionally both). The first will be an individual test that will consist of either a modification of the practice presented, or an exposition of it. The second will be the assessment of the own practice by the teacher. In the second call, there will be an evaluation test of theoretical and practical content. The qualification of the practical tests will be kept if they have been passed with at least 50% of the maximum of the qualification in the first call and the delivery of the not passed practices will be required for their subsequent evaluation in the same terms as in the first call (individual test and/or assessment of the practice). |
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic | |
Complementary | |
Recommendations |