Educational guide
IDENTIFYING DATA 2024_25
Subject AUTHENTICATION TECHNOLOGIES Code 01747017
Study programme
1747 - Máster Universitario de Investigación en Ciberseguridad
Descriptors Credit. Type Year Period
3 Optional First Second
Language
Castellano
Prerequisites
Department ING.MECANICA,INFORMAT.AEROESP.
Coordinador
CAMPAZAS VEGA , ADRIAN
E-mail acamv@unileon.es
agueh@unileon.es
Lecturers
CAMPAZAS VEGA , ADRIAN
GUERRERO HIGUERAS , ANGEL MANUEL
Web http://
General description
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Presidente ING.MECANICA,INFORMAT.AEROESP. SANCHEZ GONZALEZ , LIDIA
Secretario ING.MECANICA,INFORMAT.AEROESP. MATELLAN OLIVERA , VICENTE
Vocal CONDE GONZALEZ , MIGUEL ANGEL
Tribunal suplente
Cargo Departamento Profesor
Presidente ING.MECANICA,INFORMAT.AEROESP. PANIZO ALONSO , LUIS
Secretario ING.MECANICA,INFORMAT.AEROESP. FERNANDEZ LLAMAS , CAMINO
Vocal ING.MECANICA,INFORMAT.AEROESP. RODRIGUEZ DE SOTO , ADOLFO

Competencies
Type A Code Competences Specific
  A18813
  A18814
Type B Code Competences Transversal
  B5729
  B5730
  B5731
  B5732
  B5733
  B5734
  B5735
  B5736
  B5737
  B5738
  B5739
  B5740
Type C Code Competences Nuclear
  C1
  C2
  C3
  C4
  C5

Learning aims
Competences
Knowledge of the main design techniques and current trends in network security and secure operating systems. Performing advanced analysis of trusted and secure systems. A18813
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5736
B5737
B5738
B5739
B5740
C1
C2
C3
C4
C5
Knowledge of biometric authentication technologies, their fundamentals, advantages and disadvantages. Knowledge of different authentication systems in real-world applications. A18814
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5736
B5737
B5738
B5739
B5740
C1
C2
C3
C4
C5
Application of biometric properties in the area of computer security and communications. A18814
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5736
B5737
B5738
B5739
B5740
C1
C2
C3
C4
C5
Application of biometric properties in the area of computer security and communications. Knowledge of the main design techniques and current trends in network security and secure operating systems. Performance of advanced analysis of trusted and secure systems. A18813
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5736
B5737
B5738
B5739
B5740
C1
C2
C3
C4
C5

Contents
Topic Sub-topic
Block 1: CURRENT TRENDS IN NETWORK AND OPERATING SYSTEM SECURITY Topic 1: CURRENT TRENDS IN OFFENSIVE AND DEFENSIVE NETWORK AND OPERATING SYSTEMS SECURITY
Block 2: ACCESS CONTROL AND AUTHENTICATION MECHANISMS Topic 2: ACCESS CONTROL AND AUTHENTICATION MECHANISMS

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Practicals using information and communication technologies (ICTs) in computer rooms 12 35 47
 
 
Lecture 15 10 25
 
Mixed tests 3 0 3
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Practicals using information and communication technologies (ICTs) in computer rooms Apply, at a practical level, the theory of a field of knowledge in a given context.
Lecture Presentation by the professor in the theory classroom and in the laboratory of theoretical, practical and methodological concepts. The expositions may be accompanied by audio-visual material: projected transparencies, videos, on-line resources.

Personalized attention
 
Lecture
Practicals using information and communication technologies (ICTs) in computer rooms
Description
Tutorials may be used to clarify theoretical, practical and methodological concepts. They may not be used to repeat concepts presented in classes or by audiovisual means that the student has not attended.

Assessment
  Description Qualification
Lecture 30-70%
Practicals using information and communication technologies (ICTs) in computer rooms 30-70%
 
Other comments and second call
To pass the course it will be necessary to obtain a grade of at least 40% of the maximum both in the exam and in the practical tests.


The papers and practicals submitted may be reviewed with an anti-plagiarism software that can perform checks between the work of the students of the current and previous call and against external sources. If plagiarism is detected, the work will be graded as failed. During the evaluation tests it will not be possible to use electronic resources (calculators, tablets, phones, computers, etc.), except for those tests that under express indication of the teacher require the use of any of these resources. In case of any irregularity during the celebration of the corresponding exam or evaluation test, the student will be immediately withdrawn from the exam, expelled and graded as failed. In any case, what is established in the internal regulations of the ULe included in the document "Guidelines for action in cases of plagiarism, copying or fraud in exams or evaluation tests" (Approved by the Standing Committee of the Governing Council 29/01/2015) will be taken into account.

The evaluation of the practicals will follow one of the following criteria (optionally both). The first will be an individual test that will consist of either a modification of the practice presented, or a presentation of the same. The second will be the evaluation of the practice itself by the professor.
In the second call, there will be an evaluation test of theoretical and practical contents. The grade of the practical tests will be kept if they have been passed with at least 50% of the maximum grade in the first call and the delivery of the practices not passed will be required for their subsequent evaluation in the same terms as in the first call (individual test and/or evaluation of the practice).

The use of proctoring tools (e.g. SMOWL) may be required in the evaluation tests carried out by telematic means. In reference to the proctoring programs used during the official exams, the navigation in pages external to the exam itself, unless expressly indicated, may result in the failure of the activity, at the discretion of the faculty. In case of problems in the identification of students, the faculty may require additional evaluation activities by videoconference. The conditions of these tests may be conditioned by connectivity, lighting, etc. It is the student's responsibility to follow the indications received in this regard, as well as to protect their privacy by taking the exam in an appropriate environment (isolated, with good connection, lighting, etc.).



Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic

Complementary


Recommendations