![]() |
Educational guide | |||||||||||||||||||||||||||||||||||||||
IDENTIFYING DATA | 2024_25 | |||||||||||||||||||||||||||||||||||||||
Subject | MOBILE AND DISTRIBUTED ECOSYSTEMS | Code | 01747008 | |||||||||||||||||||||||||||||||||||||
Study programme |
|
|||||||||||||||||||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||||||||||||||||||||
4 | Compulsory | First | Second |
|||||||||||||||||||||||||||||||||||||
Language |
|
|||||||||||||||||||||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||||||||||||||||||||
Department | ING.ELECTR.DE SIST. Y AUTOMATI |
|||||||||||||||||||||||||||||||||||||||
Coordinador |
|
igarr@unileon.es halam@unileon.es mcbenc@unileon.es javem@unileon.es |
||||||||||||||||||||||||||||||||||||||
Lecturers |
|
|||||||||||||||||||||||||||||||||||||||
Web | http://agora.unileon.es | |||||||||||||||||||||||||||||||||||||||
General description | Analyze and develop safety systems applied to mobile ecosystems and distributed systems. | |||||||||||||||||||||||||||||||||||||||
Tribunales de Revisión |
|
|||||||||||||||||||||||||||||||||||||||
Competencies |
Type A | Code | Competences Specific |
A18799 | ||
Type B | Code | Competences Transversal |
B5729 | ||
B5730 | ||
B5731 | ||
B5732 | ||
B5733 | ||
B5734 | ||
B5735 | ||
B5736 | ||
B5737 | ||
B5738 | ||
B5739 | ||
B5740 | ||
Type C | Code | Competences Nuclear |
C1 | ||
C2 | ||
C3 | ||
C4 | ||
C5 |
Learning aims |
Competences | |||
Analyze and develop safety systems applied to mobile ecosystems and distributed systems | A18799 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5739 |
C1 C4 C5 |
Knowledge of security techniques for accessing resources and services in distributed systems and the cloud. | A18799 |
B5729 B5730 B5731 B5732 B5733 B5736 B5737 B5738 |
C1 C2 C3 |
Understanding the main security and privacy techniques and implications in mobile environments. | A18799 |
B5729 B5730 B5731 B5732 B5733 B5740 |
C2 C4 C5 |
Contents |
Topic | Sub-topic |
MODULE I: Architecture and models in distributed cloud systems | Topic 1. Introduction. Distributed Systems in the Cloud. Topic 2. Amazon Web Services (AWS) Platform. Architecture and Management. Topic 3. Deployment of Distributed Infrastructure on AWS. Topic 4. Security in the Management and Use of Cloud Infrastructure. Topic 5. Security in Distributed Systems with Local-Remote Communication. |
MODULE II: Security in mobile environments | Topic 1. Protocols. Topic 2. Threats and Attack Vectors. Topic 3. Secure Policies. |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
Practicals using information and communication technologies (ICTs) in computer rooms | 13 | 19.5 | 32.5 | ||||||
PBL (Problem Based Learning) | 12 | 18 | 30 | ||||||
Lecture | 13 | 19.5 | 32.5 | ||||||
Mixed tests | 2.5 | 0 | 2.5 | ||||||
Mixed tests | 2.5 | 0 | 2.5 | ||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
Practicals using information and communication technologies (ICTs) in computer rooms | Practical application of the theory of a knowledge area in a particular context. Practical exercises using ICTs. |
PBL (Problem Based Learning) | Strategy consisting of students resolving problems and reflecting on their learning experiences, normally working collaboratively. |
Lecture | Description of the contents of the subject. |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Practicals using information and communication technologies (ICTs) in computer rooms | Deliverables Throughout the Course |
40% | |
Mixed tests | Self-assessment questionnaires Intermediary deliverables |
10% |
|
Mixed tests | Final questionnaire. | 50% | |
Others | Improper behavior by the student in class may be penalized. |
||
Other comments and second call | |||
In the online mode, there will be a final exam either in person or using proctoring tools. For students in the distance learning mode of the master's program: Regarding the proctoring programs used (SMOWL) during the official exams for the distance learning mode, browsing pages external to the exam itself, unless expressly indicated, may lead to failing that activity, at the discretion of the faculty. In case of identification problems, faculty may require additional evaluation activities via video conference. The conditions of these tests can be affected by connectivity, lighting, etc., and it is the student's responsibility to follow the instructions received regarding this, as well as to protect their privacy by taking the exam in an appropriate environment (isolated, with good connection, lighting, etc.). Recommendations for students using SMOWL can be found at the following link: http://bit.ly/3ZrtxVs |
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic | |
M. Grayson, K. Shatzkamer, K. Wierenga, Building the mobile Internet, Cisco Press, 2011 G. Coulouris, J. Dollimore, T.Kindberg, G. Blair. Distributed Systems. Concepts and Design, 5th edition, Addison-Wesley, 2011 N. Bergman, M. Stanfield, J. Rouse y otros, Hacking Mobile Exposed, 1 st edition, McGraw-Hill Education, 2013 H. Dwivedi, C. Clark, D. Thiel, Mobile Application Security, McGraw-Hill, 2011 |
|
Complementary | |
Recommendations |