filmeu

Class Security and Auditing

  • Presentation

    Presentation

    The course focuses on security in computer systems and provides a brief introduction to encryption. Threats
    against systems are covered, as well as methods, technologies, and standards that are enforced to protect
    against such threats. A study is made of the auditing methods to be applied, addressing audits of information
    systems and security audits.

  • Code

    Code

    ULP452-22527
  • Syllabus

    Syllabus

    1. Basic safety concepts: security properties, policies and principles. Threats: risks and vulnerabilities, attacks, security infrastructure. Layers of a system and its security mechanisms. Distribution of security mechanisms. Defenses at the network and machine level.

    2. Fundamentals of Cryptography: symmetric and asymmetric encryption, digital signature, public key infrastructure. Hash Functions.

    3. Authentication and access control. Message integrity and confidentiality.

    4. Audit. Internal and external audits. Types of auditing. Security Audit. Standards and standardization: safety standards, information security certification, control. Audit of information systems. Information technology audit tools and techniques. Application of the computer-aided audit technique (TAAC). Documentation. Standards and code of ethics for auditing information systems. Evaluation of procedures and risk analysis.

  • Objectives

    Objectives

    Correctly use the tools in use in the context of security and auditing, in networks and systems, as well as carry out the analysis of a problem and its resolution and / or implementation of measures in accordance with the rules in force.

  • Teaching methodologies and assessment

    Teaching methodologies and assessment

    Exposure to guest seminars from companies listed in the PSI 20 where they address the practice of the subjects taught in a work environment.
    CTF will be held at specific events for this purpose. An academic conference will be called to assess the quality of students in relation to the production of scientific content in computer security.

  • References

    References

    • Garfinkel, S., Spafford, G., & Schwartz, A. (2003). Practical UNIX and Internet security. "Reilly Media, Inc."
    • Sriram, R. S. (2015). Auditing Information Systems.
    • Wiley Encyclopedia of Management, 1-6. Peltier, T. R.(2016). Information Security Policies, Procedures, and Standards: guidelines for effective information
      security management. Auerbach Publications.
    • Ford, W., & Baum, M. S. (2000). Secure electronic commerce:building the infrastructure for digital signatures and encryption. Prentice Hall PTR.

     

SINGLE REGISTRATION
Lisboa 2020 Portugal 2020 Small Logo EU small Logo PRR republica 150x50 Logo UE Financed Provedor do Estudante Livro de reclamaões Elogios