Educational guide | ||||||||||||||||||||||||||||||||||||||||
IDENTIFYING DATA | 2019_20 | |||||||||||||||||||||||||||||||||||||||
Subject | AUTHENTICATION TECHNOLOGIES IN CYBERSECURITY | Code | 01733120 | |||||||||||||||||||||||||||||||||||||
Study programme |
|
|||||||||||||||||||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||||||||||||||||||||
6 | Optional | Second | First |
|||||||||||||||||||||||||||||||||||||
Language |
|
|||||||||||||||||||||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||||||||||||||||||||
Department | ING.MECANICA,INFORMAT.AEROESP. |
|||||||||||||||||||||||||||||||||||||||
Coordinador |
|
mcasl@unileon.es lsang@unileon.es jpela@unileon.es |
||||||||||||||||||||||||||||||||||||||
Lecturers |
|
|||||||||||||||||||||||||||||||||||||||
Web | http://agora.unileon.es | |||||||||||||||||||||||||||||||||||||||
General description | An introduction to authentication technologies in cybersecurity | |||||||||||||||||||||||||||||||||||||||
Tribunales de Revisión |
|
|||||||||||||||||||||||||||||||||||||||
Competencies |
Type A | Code | Competences Specific |
A17100 | ||
Type B | Code | Competences Transversal |
B5220 | ||
B5221 | ||
B5222 | ||
B5223 | ||
B5224 | ||
B5225 | ||
Type C | Code | Competences Nuclear |
C1 | ||
C2 | ||
C3 | ||
C4 | ||
C5 |
Learning aims |
Competences | |||
Learning available authentication systems in real world applications. | A17100 |
B5220 B5221 B5222 B5223 B5224 B5225 |
C1 C2 C3 C4 C5 |
Learning biometric authentication technologies, their foundations, advantages and disadvantages. | A17100 |
B5220 B5221 B5222 B5223 B5224 B5225 |
C1 C2 C3 C4 C5 |
Students can apply their conclussions | A17100 |
B5220 B5221 B5222 B5223 B5224 B5225 |
C1 C2 C3 C4 C5 |
Contents |
Topic | Sub-topic |
I. Authentication technologies | I. Authentication technologies |
II. Authentication vulnerabilities | II. Authentication vulnerabilities |
III. Multi-factor authentication | III. Multi-factor authentication |
IV. Biometric authentication technologies | IV. Biometric authentication technologies |
V. Biometric authentication systems in real world applications | V. Biometric authentication systems in real world applications |
VI. Market, regulation, and user acceptance | VI. Market, regulation, and user acceptance |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
Personal tuition | 4 | 8.5 | 12.5 | ||||||
Tutorship of group | 6 | 15.5 | 21.5 | ||||||
Assignments | 15 | 37 | 52 | ||||||
Presentations / expositions | 5 | 9 | 14 | ||||||
Lecture | 12 | 28 | 40 | ||||||
Mixed tests | 5 | 5 | 10 | ||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
Personal tuition | Time to provide support to the student's concerns on the topics covered |
Tutorship of group | Sessions devoted to monitoring the development of the assignments |
Assignments | Development of practical exercises addressing the main issues covered in the theory sessions |
Presentations / expositions | Presentations addressing the development of the assignments |
Lecture | Plenary session to provide guidance on the contents and focus on the crucial issues |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Assignments | 40% | ||
Mixed tests | Tests addressing the topics comprehended on the contents | Ver 'Otros comentarios y segunda convocatoria' 60% |
|
Others | Analysis of the assigments handed in by the students | See 'Other comments and second call' | |
Other comments and second call | |||
<p>The evaluation system considers 'Summative evaluation' (S1) and 'Continuous-Formative Evaluation' (S2).</p><div>S1 weight on the final mark might vary from a minimum of 50% to a maximum of 70%. Accordingly, &nbsp;S2 weight on the final mark might vary from a maximum of 50% to a minimum of 30%.</div><div><br /></div><div>Second call evaluation follows the same rules as the first one.</div> |
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic |
The National Academies Press, Authentication technologies related documents, Cybersecurity collection, http://www.nap.edu/collection/31/cybersecurity Ravindra Das, Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture, CRC-PRESS, Manuel Castejón Limas, Textbook, Javier Alfonso Cendón, Laura Fernández Robles |
Complementary |
, Moodle materials, , |
Recommendations |