Educational guide
IDENTIFYING DATA 2024_25
Subject MOBILE AND DISTRIBUTED ECOSYSTEMS Code 01747008
Study programme
1746 - Máster Universitario de Investigación en Ciberseguridad (OL)
Descriptors Credit. Type Year Period
4 Compulsory First Second
Language
Castellano
Prerequisites
Department ING.ELECTR.DE SIST. Y AUTOMATI
Coordinador
GARCÍA RODRÍGUEZ , ISAÍAS
E-mail igarr@unileon.es
halam@unileon.es
mcbenc@unileon.es
javem@unileon.es
Lecturers
ALAIZ MORETÓN , HÉCTOR
BENAVIDES CUÉLLAR , MARÍA DEL CARMEN
GARCÍA RODRÍGUEZ , ISAÍAS
AVELEIRA MATA , JOSE ANTONIO
Web http://agora.unileon.es
General description Analyze and develop safety systems applied to mobile ecosystems and distributed systems.
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Presidente ING.ELECTR.DE SIST. Y AUTOMATI ALONSO CASTRO , SERAFIN
Secretario ING.ELECTR.DE SIST. Y AUTOMATI PRADA MEDRANO , MIGUEL ANGEL
Vocal ING.ELECTR.DE SIST. Y AUTOMATI FERNANDEZ LOPEZ , CARLOS
Tribunal suplente
Cargo Departamento Profesor
Presidente ING.ELECTR.DE SIST. Y AUTOMATI DIEZ DIEZ , ANGELA
Secretario ING.ELECTR.DE SIST. Y AUTOMATI ALAIZ RODRIGUEZ , ROCIO
Vocal ING.ELECTR.DE SIST. Y AUTOMATI FUERTES MARTINEZ , JUAN JOSE

Competencies
Type A Code Competences Specific
  A18799
Type B Code Competences Transversal
  B5729
  B5730
  B5731
  B5732
  B5733
  B5734
  B5735
  B5736
  B5737
  B5738
  B5739
  B5740
Type C Code Competences Nuclear
  C1
  C2
  C3
  C4
  C5

Learning aims
Competences
Analyze and develop safety systems applied to mobile ecosystems and distributed systems A18799
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5739
C1
C4
C5
Knowledge of security techniques for accessing resources and services in distributed systems and the cloud. A18799
B5729
B5730
B5731
B5732
B5733
B5736
B5737
B5738
C1
C2
C3
Understanding the main security and privacy techniques and implications in mobile environments. A18799
B5729
B5730
B5731
B5732
B5733
B5740
C2
C4
C5

Contents
Topic Sub-topic
MODULE I: Architecture and models in distributed cloud systems Topic 1. Introduction. Distributed Systems in the Cloud.

Topic 2. Amazon Web Services (AWS) Platform. Architecture and Management.

Topic 3. Deployment of Distributed Infrastructure on AWS.

Topic 4. Security in the Management and Use of Cloud Infrastructure.

Topic 5. Security in Distributed Systems with Local-Remote Communication.
MODULE II: Security in mobile environments Topic 1. Protocols.

Topic 2. Threats and Attack Vectors.

Topic 3. Secure Policies.

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Practicals using information and communication technologies (ICTs) in computer rooms 13 19.5 32.5
 
PBL (Problem Based Learning) 12 18 30
 
Lecture 13 19.5 32.5
 
Mixed tests 2.5 0 2.5
Mixed tests 2.5 0 2.5
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Practicals using information and communication technologies (ICTs) in computer rooms Practical application of the theory of a knowledge area in a particular context. Practical exercises using ICTs.
PBL (Problem Based Learning) Strategy consisting of students resolving problems and reflecting on their learning experiences, normally working collaboratively.
Lecture Description of the contents of the subject.

Personalized attention
 
PBL (Problem Based Learning)
Lecture
Practicals using information and communication technologies (ICTs) in computer rooms
Description
Solving doubts, via telephone, email and video conference with appointment.

Assessment
  Description Qualification
Practicals using information and communication technologies (ICTs) in computer rooms Deliverables Throughout the Course






40%
Mixed tests Self-assessment questionnaires
Intermediary deliverables
10%
Mixed tests Final questionnaire. 50%
Others Improper behavior by the student in class may be penalized.






 
Other comments and second call

In the online mode, there will be a final exam either in person or using proctoring tools.

For students in the distance learning mode of the master's program:

Regarding the proctoring programs used (SMOWL) during the official exams for the distance learning mode, browsing pages external to the exam itself, unless expressly indicated, may lead to failing that activity, at the discretion of the faculty. In case of identification problems, faculty may require additional evaluation activities via video conference. The conditions of these tests can be affected by connectivity, lighting, etc., and it is the student's responsibility to follow the instructions received regarding this, as well as to protect their privacy by taking the exam in an appropriate environment (isolated, with good connection, lighting, etc.). Recommendations for students using SMOWL can be found at the following link: http://bit.ly/3ZrtxVs


Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic

M. Grayson, K. Shatzkamer, K. Wierenga, Building the mobile Internet, Cisco Press, 2011

G. Coulouris, J.  Dollimore, T.Kindberg, G. Blair. Distributed Systems. Concepts and Design, 5th edition, Addison-Wesley, 2011

N. Bergman, M. Stanfield, J. Rouse y otros, Hacking Mobile Exposed, 1

st

 edition, McGraw-Hill Education, 2013

H. Dwivedi, C. Clark, D. Thiel, Mobile Application Security, McGraw-Hill, 2011

Complementary


Recommendations