Educational guide | ||||||||||||||||||||||
IDENTIFYING DATA | 2021_22 | |||||||||||||||||||||
Subject | AUTHENTICATIO TECHNOLOGIES IN CYBERSECURITY | Code | 01732020 | |||||||||||||||||||
Study programme | ||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||
6 | Optional | Second | ||||||||||||||||||||
Language |
|
|||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||
Department | ||||||||||||||||||||||
Coordinador | ||||||||||||||||||||||
Lecturers | |
|||||||||||||||||||||
Web | http://agora.unileon.es | |||||||||||||||||||||
General description | An introduction to authentication technologies in cybersecurity | |||||||||||||||||||||
Tribunales de Revisión |
|
|||||||||||||||||||||
Competencies |
Type A | Code | Competences Specific |
Type B | Code | Competences Transversal |
Type C | Code | Competences Nuclear |
C1 | ||
C2 | ||
C3 | ||
C4 | ||
C5 |
Learning aims |
Competences | |||
Learning available authentication systems in real world applications. | A17056 |
B5218 B5219 |
C1 C2 C4 C5 |
Learning biometric authentication technologies, their foundations, advantages and disadvantages. | B5218 B5219 |
C1 C2 C4 C5 |
|
Students can apply their conclussions | B5214 B5215 B5216 B5217 |
C3 |
Contents |
Topic | Sub-topic |
I. Authentication technologies | I. Authentication technologies |
II. Authentication vulnerabilities | II. Authentication vulnerabilities |
III. Multi-factor authentication | III. Multi-factor authentication |
IV. Biometric authentication technologies | IV. Biometric authentication technologies |
V. Biometric authentication systems in real world applications | V. Biometric authentication systems in real world applications |
VI. Market, regulation, and user acceptance | VI. Market, regulation, and user acceptance |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
Personal tuition | 4 | 8.5 | 12.5 | ||||||
Tutorship of group | 6 | 15.5 | 21.5 | ||||||
Assignments | 12 | 40 | 52 | ||||||
Presentations / expositions | 4 | 10 | 14 | ||||||
Lecture | 12 | 28 | 40 | ||||||
Mixed tests | 5 | 5 | 10 | ||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
Personal tuition | Time to provide support to the student's concerns on the topics covered |
Tutorship of group | Sessions devoted to monitoring the development of the assignments |
Assignments | Development of practical exercises addressing the main issues covered in the theory sessions |
Presentations / expositions | Presentations addressing the development of the assignments |
Lecture | Plenary session to provide guidance on the contents and focus on the crucial issues |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Assignments | 40% | ||
Mixed tests | Tests addressing the topics comprehended on the contents | Ver 'Otros comentarios y segunda convocatoria' 60% |
|
Others | Analysis of the assigments handed in by the students | See 'Other comments and second call' | |
Other comments and second call | |||
<p>The evaluation system considers 'Summative evaluation' (S1) and 'Continuous-Formative Evaluation' (S2).</p><div>S1 weight on the final mark might vary from a minimum of 50% to a maximum of 70%. Accordingly,  S2 weight on the final mark might vary from a maximum of 50% to a minimum of 30%.</div><div><br /></div><div>Second call evaluation follows the same rules as the first one.</div> |
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic |
The National Academies Press, Authentication technologies related documents, Cybersecurity collection, http://www.nap.edu/collection/31/cybersecurity Ravindra Das, Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture, CRC-PRESS, Manuel Castejón Limas, Textbook, Javier Alfonso Cendón, Laura Fernández Robles |
Complementary |
, Moodle materials, , |
Recommendations |