Informatic Security


The main objectives that should be attained in order to succeed this course are:

  • O1: Understand how computer-based information systems are exposed to security risks;
  • O2: Understand the multiple dimensions of influencers that can affect computer security (technical and non-technical aspects);
  • O3: Evaluate the influence of information systems security on today's businesses;
  • O4: Understand security requirements to support current business systems;
  • O5: Acquire technical knowledge to assess security on computer-based information systems;
  • O6: Design and evaluate controls to improve computer security.

General characterization





Responsible teacher

José Eduardo de Mendonça Tomás Barateiro


Weekly - Available soon

Total - Available soon

Teaching language

Portuguese. If there are Erasmus students, classes will be taught in English




  • Principles of Information Security, Michael Whitman and Herbert Mattord, 5th Edition, Cengage, 2015;
  • Segurança em Redes Informáticas, André Zúquete, 4ª Edição, FCA Editora de Informática, 2013;
  • Principles of Information Systems Security, Gurpreet Dhillon, Wiley, 2007;

Teaching method

Theoretical component focused on oral presentations and intuitive methods supported by digital contents. Practical component based on oral presentations, discussion and resolution of practical exercises and case studies.

Evaluation method

  • Project (40%): Groups of 3 or 4 students; 3 phases evaluation (Intermediate deliverable with feedback; Final deliverable; Discussion). Minimum mark: 8.5
  • Project peer-review (10%): during project discussion
  • Individual written test (60%). Minimum mark: 8.5

Group project and individual written test grades are rounded to tenths

Final mark = 0.4 (Project mark) + 0.1(Peer-review mark) + 0.5 (Written test mark)

Students have the option to be evaluated on a single full exam (same date as firts test or in the second evaluation phase). The full exam mark is 100% of the final mark.

Subject matter

  1. Information Security fundamentals;
  2. Computer security;
  3. Managing information security;
  4. Risk management for information systems security;
  5. Asset management;
  6. Threats and Vulnerabilities;
  7. Cryptography;
  8. Key management, public keys and digital signatures;
  9. Web security;
  10. Network security.