Educational guide
IDENTIFYING DATA 2021_22
Subject AUTHENTICATIO TECHNOLOGIES IN CYBERSECURITY Code 01732020
Study programme
Descriptors Credit. Type Year Period
6 Optional Second
Language
Castellano
Ingles
Prerequisites
Department
Coordinador
E-mail
Lecturers
Web http://agora.unileon.es
General description An introduction to authentication technologies in cybersecurity
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Tribunal suplente
Cargo Departamento Profesor

Competencies
Type A Code Competences Specific
Type B Code Competences Transversal
Type C Code Competences Nuclear
  C1
  C2
  C3
  C4
  C5

Learning aims
Competences
Learning available authentication systems in real world applications. A17056
B5218
B5219
C1
C2
C4
C5
Learning biometric authentication technologies, their foundations, advantages and disadvantages. B5218
B5219
C1
C2
C4
C5
Students can apply their conclussions B5214
B5215
B5216
B5217
C3

Contents
Topic Sub-topic
I. Authentication technologies I. Authentication technologies
II. Authentication vulnerabilities II. Authentication vulnerabilities
III. Multi-factor authentication III. Multi-factor authentication
IV. Biometric authentication technologies IV. Biometric authentication technologies
V. Biometric authentication systems in real world applications V. Biometric authentication systems in real world applications
VI. Market, regulation, and user acceptance VI. Market, regulation, and user acceptance

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Personal tuition 4 8.5 12.5
 
Tutorship of group 6 15.5 21.5
Assignments 12 40 52
Presentations / expositions 4 10 14
 
Lecture 12 28 40
 
Mixed tests 5 5 10
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Personal tuition Time to provide support to the student's concerns on the topics covered
Tutorship of group Sessions devoted to monitoring the development of the assignments
Assignments Development of practical exercises addressing the main issues covered in the theory sessions
Presentations / expositions Presentations addressing the development of the assignments
Lecture Plenary session to provide guidance on the contents and focus on the crucial issues

Personalized attention
 
Personal tuition
Description
Time to provide guidance on those aspects where major concerns may appear while learning the topics covered on the contents

Assessment
  Description Qualification
Assignments 40%
Mixed tests Tests addressing the topics comprehended on the contents Ver 'Otros comentarios y segunda convocatoria'
60%
Others Analysis of the assigments handed in by the students See 'Other comments and second call'
 
Other comments and second call
<p>The evaluation system considers 'Summative evaluation' (S1) and 'Continuous-Formative Evaluation' (S2).</p><div>S1 weight on the final mark might vary from a minimum of 50% to a maximum of 70%. Accordingly,  S2 weight on the final mark might vary from a maximum of 50% to a minimum of 30%.</div><div><br /></div><div>Second call evaluation follows the same rules as the first one.</div>

Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic The National Academies Press, Authentication technologies related documents, Cybersecurity collection, http://www.nap.edu/collection/31/cybersecurity
Ravindra Das, Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture, CRC-PRESS,
Manuel Castejón Limas, Textbook, Javier Alfonso Cendón, Laura Fernández Robles

Complementary , Moodle materials, ,


Recommendations