Learning outcomes |
The objectives of this course unit are to introduce and practice the correct use of information security related concepts and mechanisms, as well as to study security vulnerabilities in systems interconnected via computer networks, and audit tools and mitigation techniques for these vulnerabilities. At the end of this course unit the student should be able to: Study computer security problems from a practical and contemporary perspective, as well as describing and implementing best practices and solutions that minimize the impact of potential threats, or search for these solutions independently; Configure security tools, including firewalls and intrusion detection systems; Integrating mechanisms of information security in software applications he/she is developing; Properly utilize encryption algorithms, authentication mechanisms, digital signatures, protection systems and administrative domains and implementation of secure virtual private networks.
|
Main Bibliography |
1. Main References André Zúquete, Segurança em Redes Informáticas, FCA - Editora de Informática, 3ª Ed. (actualizada e aumentada), 2010. William Stallings e Lawrie Brown, Computer Security: Principles and Practice, Prentice Hall 2008. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press. (disponível on-line em http://www.cacr.math.uwaterloo.ca/hac/)
2. Secondary References João Amado, Hackers, Técnicas de Defesa e de Ataque, FCA - Editora de Informática, 3ª Ed. (actualizada e aumentada), 2006. Henrique São Mamede, Segurança Informática nas Organizações, FCA - Editora de Informática, 2006. William Stallings, Cryptography and Network Security, 4/E, Prentice Hall, 2006.
|