Understand the dynamic nature and duality of the notion of security of computer systems
Define appropriate policies for the protection of computer systems, considering, among other aspects, their concrete assets, actors and motivations and identified threats
Apply mechanisms and tools necessary to implement security policies defined to protect specific computer systems
Apply procedures, techniques and tools for recognizing the security posture of computer systems
Apply techniques and tools
Program
Introduction to the security of computing systems (e.g. properties, actors, motivations)
Digital asset protection principles (e.g. reference model, least privilege, multi-level security)
Threat modeling, risk mitigation and security policies
Identity, authentication and access control
Identity and credentials management
Vulnerabilities, exploits and malicious software in the operating system
Security and isolation in the operating system (files, communication, processes, containerization, virtualization, secure execution environments)
Monitoring, detection and prevention of intrusion into the operating system
Identification of vulnerabilities and penetration tests in computer systems
Bibliography
W. Stallings, L. Brown. Computer Security: Principles and Practice. 4th Edition, Pearson, 2018.
C. Pfleeger, S. Pfleeger, L. Coles-Kemp. Security in Computing. 6th Edition, O’Reilly, 2023.
W. Du. Computer Security: A Hands-on Approach. 3rd Edition, CreateSpace, 2022.
W. Stallings. Cryptography and Network Security: Principles and Practice. 8th Edition, Pearson, 2022.
D. Gollmann. Computer Security. 3rd Edition, Wiley, 2011.