Educational guide
IDENTIFYING DATA 2019_20
Subject AUTHENTICATION TECHNOLOGIES IN CYBERSECURITY Code 01733120
Study programme
1732 - MASTER UNIVERSITARIO EN INVESTIGACION EN CIBERSEGURIDAD (OL)
Descriptors Credit. Type Year Period
6 Optional Second First
Language
Castellano
Ingles
Prerequisites
Department ING.MECANICA,INFORMAT.AEROESP.
Coordinador
CASTEJÓN LIMAS , MANUEL
E-mail mcasl@unileon.es
lsang@unileon.es
jpela@unileon.es
Lecturers
CASTEJÓN LIMAS , MANUEL
SÁNCHEZ GONZÁLEZ , LIDIA
PELAEZ ALVAREZ , JUAN DELFIN
Web http://agora.unileon.es
General description An introduction to authentication technologies in cybersecurity
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Presidente ING.MECANICA,INFORMAT.AEROESP. PEREZ GARCIA , HILDE
Secretario ING.MECANICA,INFORMAT.AEROESP. CUERVO FERNANDEZ , EVA MARIA
Vocal ING.MECANICA,INFORMAT.AEROESP. FERNANDEZ LLAMAS , CAMINO
Tribunal suplente
Cargo Departamento Profesor
Presidente ING.MECANICA,INFORMAT.AEROESP. PANIZO ALONSO , LUIS
Secretario ING.MECANICA,INFORMAT.AEROESP. RODRIGUEZ DE SOTO , ADOLFO
Vocal ING.MECANICA,INFORMAT.AEROESP. MATELLAN OLIVERA , VICENTE

Competencies
Type A Code Competences Specific
  A17100
Type B Code Competences Transversal
  B5220
  B5221
  B5222
  B5223
  B5224
  B5225
Type C Code Competences Nuclear
  C1
  C2
  C3
  C4
  C5

Learning aims
Competences
Learning available authentication systems in real world applications. A17100
B5220
B5221
B5222
B5223
B5224
B5225
C1
C2
C3
C4
C5
Learning biometric authentication technologies, their foundations, advantages and disadvantages. A17100
B5220
B5221
B5222
B5223
B5224
B5225
C1
C2
C3
C4
C5
Students can apply their conclussions A17100
B5220
B5221
B5222
B5223
B5224
B5225
C1
C2
C3
C4
C5

Contents
Topic Sub-topic
I. Authentication technologies I. Authentication technologies
II. Authentication vulnerabilities II. Authentication vulnerabilities
III. Multi-factor authentication III. Multi-factor authentication
IV. Biometric authentication technologies IV. Biometric authentication technologies
V. Biometric authentication systems in real world applications V. Biometric authentication systems in real world applications
VI. Market, regulation, and user acceptance VI. Market, regulation, and user acceptance

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Personal tuition 4 8.5 12.5
 
Tutorship of group 6 15.5 21.5
Assignments 15 37 52
Presentations / expositions 5 9 14
 
Lecture 12 28 40
 
Mixed tests 5 5 10
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Personal tuition Time to provide support to the student's concerns on the topics covered
Tutorship of group Sessions devoted to monitoring the development of the assignments
Assignments Development of practical exercises addressing the main issues covered in the theory sessions
Presentations / expositions Presentations addressing the development of the assignments
Lecture Plenary session to provide guidance on the contents and focus on the crucial issues

Personalized attention
 
Personal tuition
Description
Time to provide guidance on those aspects where major concerns may appear while learning the topics covered on the contents

Assessment
  Description Qualification
Assignments 40%
Mixed tests Tests addressing the topics comprehended on the contents Ver 'Otros comentarios y segunda convocatoria'
60%
Others Analysis of the assigments handed in by the students See 'Other comments and second call'
 
Other comments and second call
<p>The evaluation system considers 'Summative evaluation' (S1) and 'Continuous-Formative Evaluation' (S2).</p><div>S1 weight on the final mark might vary from a minimum of 50% to a maximum of 70%. Accordingly,  S2 weight on the final mark might vary from a maximum of 50% to a minimum of 30%.</div><div><br /></div><div>Second call evaluation follows the same rules as the first one.</div>

Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic The National Academies Press, Authentication technologies related documents, Cybersecurity collection, http://www.nap.edu/collection/31/cybersecurity
Ravindra Das, Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture, CRC-PRESS,
Manuel Castejón Limas, Textbook, Javier Alfonso Cendón, Laura Fernández Robles

Complementary , Moodle materials, ,


Recommendations