|
Information and Communication Technologies Security
Scholar Year: 2015/2016 - 1S
Code: |
LGSI10567 |
|
Acronym: |
SEGTIC |
Scientific Fields: |
Sistemas e Tecnologias de Informação |
Instance: 2015/2016 - 1S
Courses
Acronym |
Nº of students |
Study Plan |
Curricular year |
ECTS |
Contact hours |
Total Time |
LGSI |
28 |
|
3º |
5,5 |
60 |
148,5 |
Docência - ResponsabilidadesTeacher | Responsability |
---|
Maria Leonilde dos Reis | Head |
|
Teaching language
English
Objetivos de aprendizagem
The learning outcomes underlying the Course are focused on the knowledge acquisition:
• Understand the rules / standards national and international underlying theme of Physical and Logical Security of Information Systems;
• Understand and encourage Business Continuity Planning;
• Develop methodologies and procedures to support Technology Audits, in accordance with organizational policies and national and international standards underlying the activity.
The skills and competencies developed by students:
• Acquisition of skills to understand and dominate the Standards / National and International Standards in the field of theme;
• Ability to promote / propose the analysis procedures inherent to policies of the Information Systems Security;
• Provide the students skills to Analyze / propose policies to support business continuity;
• Acquisition of skills to Understand the importance of the role of the Information Systems Audit and Information Technology and Communication.
Contents
PHYSICAL SECURITY AND LOGIC OF INFORMATION SYSTEMS
Introduction
Objectives of Information Security
Information Security
Risk Management
Security Policies
Physical Security
Logic Security
Guidelines / Standards
BUSINESS CONTINUITY PLANNING IN ORGANIZATIONAL CONTEXT
History / Evolution
Necessity of Business Continuity Planning
Objectives of Business Continuity Planning
Business Continuity Planning
Integration of Information Systems Planning and Business Continuity Planning
Problematic for SMEs
Guidelines / Standards
AUDIT OF INFORMATION SYSTEMS
Principles
Types of Audit
Process Audit
Phases of an Audit
Technology Audit
Impact of Audit
GUIDELINES / STANDARDS TO SUPORT ACTIVITY
Keywords
Technological sciences > Technology > Information technology > Security technology > Security systems
Teaching Procedures
Lessons are oriented for a theoretical explanation of relevant issues for Physical and Logical Security of Information Systems, Business Continuity Planning for Organizational Context and Audit and Business
Continuity (expository method) and the practical application of knowledge (participatory method), holding up examples of practical application of the knowledge acquired.
As far as possible, the concepts will be illustrated based on practical applications using the participative method for solving exercises.
The evaluation of knowledge comprises:
• Preparation, presentation and discussion of individual work, conducted in an organizational context;
• Realization of a test.
Evaluation Type
Frequency Attainment
The continuous assessment consists of:
• Presentation of the Theme of Single Practical Work (ATP);
• Presentation and discussion of the Single Practical Work (TP);
• Realization of a Single Theoretical Test (TT).
Final Classification = 0.10 ATP + 0.45 TP + 0, 45 TT.
Final Classification
The final assessment comprises:
• Exam Theoretical / Practical (ETP).
• Presentation and Discussion of Single Practical Work (ICC);
Final Classification = 0.50 ETP + 0.50 ICC
Special Evaluation (Working Students, etc)
The Classification comprises:
• Exam Theoretical / Practical (ETP).
• Presentation and Discussion of Single Practical Work (ICC);
Final Classification = 0.50 ETP + 0.50 ICC
Classification Improvement
The Classification comprises:
• Exam Theoretical / Practical (ETP).
• Presentation and Discussion of Single Practical Work (ICC);
Final Classification = 0.50 ETP + 0.50 ICC
Main Bibliography
PARKER, D.;Toward a New Framework for Information Security, in Bosworth, John Wiley Sons, 2002 |
PFLEEGER, C. and PFLEEGER, S.;Security in Computing, Prentice-Hall, 2003 |
Toigo, J. W.,;Disaster Recovery Planning – Preparing for the unthinkable, Prentice Hall, 2002 |
MAINWALD, E. and SIEGEIN, W.;Security Planning & Disaster Recovery - Protect your Organization Resources, McGraw-Hill Osborne, 2002 |
British Standard;ISO/IEC 27001, ISO, 2005 |
British Standard;ISO/IEC 27002, ISO, 2005 |
|
|