General information


Subject type: Optional

Coordinator: Rosa Herrero Antón

Trimester: Third term

Credits: 6

Teaching staff: 

Pere Tuset Peiró

Teaching languages


  • English

The teaching of the theory and laboratory classes, as well as the documentation of the subject and the assessment tests, will be exclusively in English. Therefore, the students must be able to follow the explanations of the teachers of the subject in English, as well as read and understand texts written in technical English. Regarding the assessment activities and the handing in of the reports, the students will be able to answer them in Catalan, Spanish or English, as they find most convenient, although it is recommended to do so in English. Finally, during the evaluation activities, the students will be able to ask questions to the teachers of the subject in order to facilitate the understanding of the statements and their resolution.

Skills


Basic skills
  • B2_That students know how to apply their knowledge to their job or vocation in a professional way and have the skills they demonstrate by developing and defending arguments and solving problems within their area of ​​study

Specific skills
  • ESI1_Ability to integrate Information and Communications Technology solutions and business processes to meet the information needs of organizations, enabling them to achieve their goals effectively and efficiently, thus achieving competitive advantage

  • ESI2_Ability to determine the requirements of the information and communication systems of an organization, taking into account security aspects and compliance with current regulations and legislation

  • ESI3_Ability to actively participate in the specification, design, implementation and maintenance of information and communication systems

  • ESI5_Ability to understand and apply the principles of risk assessment and apply them correctly in the elaboration and execution of action plans

Transversal competences
  • T1_That students know a third language, which will be preferably English, with an adequate level of oral and written form, according to the needs of the graduates in each degree

Description


In general, this subject covers the following descriptors specified for the subject to which it belongs (Computer Architecture, Operating Systems and Computer Networks):

  1. Local area networks (architecture and typologies, Ethernet, wireless networks)
  2. IP networks (protocol, routing, ARP, address translation, DNS, firewalls, private networks)
  3. Advanced concepts of TCP/IP protocols, Internet Service Providers (ISPs), routing algorithms, and multimedia protocols
  4. Network applications (client-server paradigm, document exchange (web, HTTP, FTP), e-mail (SMTP, protocols), representation of structured information (web, XML))
  5. Security in computer networks: protection, security protocols, electronic commerce, application management

Contents


The subject is structured as follows:

  • Topic 1: Introduction to cyber security
  • Topic 2: Basic cyber security concepts and tools
  • Topic 3: Security in Ethernet/Wi-Fi networks
  • Topic 4: Security in routing to the Internet
  • Topic 5: Security in the resolution of names on the Internet
  • Topic 6: Security in the development of applications and web services

For the correct monitoring of the subject, students will work with their personal computer (laptop), which they must bring to all classes.

The classroom (physical or virtual) is a safe space, free of sexist, racist, homophobic, transphobic and discriminatory attitudes, either towards students or towards teachers. We trust that together we can create a safe space where we can make mistakes and learn without having to suffer prejudice from others. 

Evaluation system


The subject is assessed through continuous assessment and a knowledge validation test, as indicated below:

  • Continuous assessment (CONTINUE): 80%
  • Validation test (VALIDATION): 20%

The final grade of the subject (NFA) is calculated according to:

  • END = CONTINUE 0,8 + VALIDATION 0,2
  • If VALIDATION >= 4: NFA = END
  • If VALIDATION < 4: NFA = MIN(FINAL, 4)

Additional considerations:

  • All activities are mandatory; activities that have not been attended or not performed are evaluated with a zero (0).
  • The mark of the validation test is recoverable on the official date, while the marks of the continuous assessment are not recoverable.
  • Any indication of copying or plagiarism (from peers, from uncited sources, or from tools such as ChatGPT) will result in the activity being assessed with a zero (0).
  • Repeated behavior of copying or plagiarism will result in the subject being evaluated with a zero (0) and the student being reported to the University management.

REFERENCES


Basic

The Cyber ​​Security Body of Knowledge (CyBOK). Available online at: https://www.cybok.org/.

J. Graham, R. Howard, R. Olson. Cybersecurity Essentials. CRC Press.