The main objectives that should be attained in order to succeed this course are:
- O1: Understand how computer-based information systems are exposed to security risks;
- O2: Understand the multiple dimensions of influencers that can affect computer security (technical and non-technical aspects);
- O3: Evaluate the influence of information systems security on today's businesses;
- O4: Understand security requirements to support current business systems;
- O5: Acquire technical knowledge to assess security on computer-based information systems;
- O6: Design and evaluate controls to improve computer security.
José Eduardo de Mendonça Tomás Barateiro
Weekly - Available soon
Total - Available soon
Portuguese. If there are Erasmus students, classes will be taught in English
- Principles of Information Security, Michael Whitman and Herbert Mattord, 5th Edition, Cengage, 2015;
- Segurança em Redes Informáticas, André Zúquete, 4ª Edição, FCA Editora de Informática, 2013;
- Principles of Information Systems Security, Gurpreet Dhillon, Wiley, 2007;
Theoretical component focused on oral presentations and intuitive methods supported by digital contents. Practical component based on oral presentations, discussion and resolution of practical exercises and case studies.
- Project (40%): Groups of 3 or 4 students; 3 phases evaluation (Intermediate deliverable with feedback; Final deliverable; Discussion). Minimum mark: 8.5
- Project peer-review (10%): during project discussion
- Individual written test (60%). Minimum mark: 8.5
Group project and individual written test grades are rounded to tenths
Final mark = 0.4 (Project mark) + 0.1(Peer-review mark) + 0.5 (Written test mark)
Students have the option to be evaluated on a single full exam (same date as firts test or in the second evaluation phase). The full exam mark is 100% of the final mark.
- Information Security fundamentals;
- Computer security;
- Managing information security;
- Risk management for information systems security;
- Asset management;
- Threats and Vulnerabilities;
- Key management, public keys and digital signatures;
- Web security;
- Network security.