{"id":2129,"date":"2020-03-05T16:43:11","date_gmt":"2020-03-05T15:43:11","guid":{"rendered":"http:\/\/people.ccaba.upc.edu\/careglio\/?page_id=2129"},"modified":"2021-07-02T12:03:21","modified_gmt":"2021-07-02T10:03:21","slug":"seguretat-informatica","status":"publish","type":"page","link":"https:\/\/people.ccaba.upc.edu\/careglio\/index.php\/teaching\/seguretat-informatica\/","title":{"rendered":"Seguretat Inform\u00e0tica"},"content":{"rendered":"<h5>Seguretat Inform\u00e0tica (SI) es una asignatura obligatoria de la especialidad Tecnolog\u00edas de la informaci\u00f3n del grado de Ingenier\u00eda Inform\u00e1tica de 6 cr\u00e9ditos. SI consiste de clases te\u00f3ricas de 3 horas semanales y de practicas en laboratorio de 2 horas cada 2 semanas.<\/p>\n<p>El objetivo de esta asignatura es la introducci\u00f3n a los conceptos b\u00e1sicos de seguridad inform\u00e1tica que todos los graduados deber\u00edan conocer para poder hacer su trabajo sin poner en peligro los sistemas inform\u00e1ticos que gestionan o programan o sus usuarios. Tambi\u00e9n se realizan pr\u00e1cticas de algunas de las herramientas que se pueden utilizar para proteger los sistemas o para detectar los errores de programaci\u00f3n o configuraci\u00f3n que los pueden poner en peligro en caso de ataque.<\/h5>\n<hr>\n<h3>Temario<\/h3>\n<h5>\n<b><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Intro.pdf\" class=\"mtli_attachment mtli_pdf\">Presentacion<\/a><\/b> (02\/2021)<span style=\"float: right;\">(1 hora)<\/span><br \/>\nPresentaci\u00f3n de la asignatura, profesorado, estructura, metodolog\u00eda, evaluaci\u00f3n y bibliograf\u00eda.<\/p>\n<ol start=\"1\">\n<li><b><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Tema1.pdf\" class=\"mtli_attachment mtli_pdf\">Introducci\u00f3n<\/a><\/b>  (02\/2021)<span style=\"float: right;\">(2 horas)<\/span><\/li>\n<ul>\n<li>Definici\u00f3n<\/li>\n<li>Objetivos<\/li>\n<li>Amenazas<\/li>\n<li>Organizaciones, personas, TIC<\/li>\n<\/ul>\n<p align=\"justify\">\n<li><b><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Tema2.pdf\" class=\"mtli_attachment mtli_pdf\">Criptograf\u00eda<\/a><\/b>  (03\/2021)<span style=\"float: right;\">(7 horas)<\/span><\/li>\n<ul>\n<li>Motivaci\u00f3n<\/li>\n<li>Definici\u00f3n<\/li>\n<li>Criptosistemas hist\u00f3ricos<\/li>\n<li>Criptograf\u00eda privada: OTP, DES, 3DES, AES<\/li>\n<li>Criptograf\u00eda p\u00fablica<\/li>\n<li>Algunos principios matem\u00e1ticos<\/li>\n<ul>\n<li>Logar\u00edtmica\/exponenciaci\u00f3n discreta<\/li>\n<li>Curvas el\u00edpticas<\/li>\n<\/ul>\n<li>Algoritmos m\u00e1s conocidos<\/li>\n<ul>\n<li>Diffie-Hellman<\/li>\n<li>RSA<\/li>\n<li>ElGamal<\/li>\n<li>RSA para Firma Digital<\/li>\n<li>Funciones Hash criptogr\u00e1ficas<\/li>\n<\/ul>\n<\/ul>\n<p align=\"justify\">\n<li><b><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Tema3.pdf\" class=\"mtli_attachment mtli_pdf\">Infraestructura PKI<\/a><\/b> (04\/2021)<span style=\"float: right;\">(4 horas)<\/span><\/li>\n<ul>\n<li>Conceptos b\u00e1sicos<\/li>\n<li>Componentes<\/li>\n<li>Modelos de confianza (trust models)<\/li>\n<li>Certificados X.509<\/li>\n<li>Public-Key Cryptography Standards (PKCS)<\/li>\n<\/ul>\n<p align=\"justify\">\n<p>\t<b>Primer control: test y problema<\/b><span style=\"float: right;\">(1 hora)<\/span><\/p>\n<p align=\"justify\">\n<li><b><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Tema4.pdf\" class=\"mtli_attachment mtli_pdf\">Seguridad en la red<\/a><\/b> (04\/2021)<span style=\"float: right;\">(6 horas)<\/span><\/li>\n<ul>\n<li>Firewall<\/li>\n<li>Sistemas de detecci\u00f3n de intrusi\u00f3n<\/li>\n<li>Arquitectura VPN<\/li>\n<\/ul>\n<p align=\"justify\">\n<li><b><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Tema5.pdf\" class=\"mtli_attachment mtli_pdf\">Seguridad en las aplicaciones<\/a><\/b> (04\/2021)<span style=\"float: right;\">(4 horas)<\/span><\/li>\n<ul>\n<li>Introducci\u00f3n<\/li>\n<li>Errores m\u00e1s comunes (seg\u00fan OWASP)<\/li>\n<li>Gesti\u00f3n de vulnerabilidades<\/li>\n<li>Auditorias<\/li>\n<\/ul>\n<p align=\"justify\">\n<p>\t<b>Segundo control: test y problema<\/b><span style=\"float: right;\">(1 hora)<\/span><\/p>\n<p align=\"justify\">\n<li><b><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Tema6.pdf\" class=\"mtli_attachment mtli_pdf\">Seguridad en los sistemas operativos<\/a><\/b> (05\/2021)<span style=\"float: right;\">(6 horas)<\/span><\/li>\n<ul>\n<li>Ataques a los SO: Malware<\/li>\n<ul>\n<li>Introducci\u00f3n<\/li>\n<li>Tipos<\/li>\n<li>Virus<\/li>\n<li>Gusanos<\/li>\n<li>Ataques comunes<\/li>\n<\/ul>\n<li>Defensa de los SO<\/li>\n<ul>\n<li>Introducci\u00f3n<\/li>\n<li>Estructura simplificada<\/li>\n<li>Matriz de acceso<\/li>\n<li>Ejemplo de implementaci\u00f3n en Linux<\/li>\n<li>Protecci\u00f3n<\/li>\n<\/ul>\n<\/ul>\n<p align=\"justify\">\n<li><b><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Tema7.pdf\" class=\"mtli_attachment mtli_pdf\">An\u00e1lisis forense<\/a><\/b> (05\/2021)<span style=\"float: right;\">(4 horas)<\/span><\/li>\n<ul>\n<li>Introducci\u00f3n<\/li>\n<li>Aspectos legales<\/li>\n<li>Aspectos de una investigaci\u00f3n<\/li>\n<li>Forensic Readiness<\/li>\n<li>Adquisici\u00f3n de evidencias<\/li>\n<li>Artefactos de Linux<\/li>\n<li>Artefactos de Windows<\/li>\n<\/ul>\n<p align=\"justify\">\n<p>\t<b>Tercer control: test y problema<\/b><span style=\"float: right;\">(1 hora)<\/span><\/p>\n<p align=\"justify\">\n<\/ol>\n<\/h5>\n<hr>\n<h3>Laboratorio<\/h3>\n<h5>\n<ul>\n<li><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Lab1.pdf\" class=\"mtli_attachment mtli_pdf\">Lab.1 &#8211; Uso de certificados digitales (HTTPS)<\/a> (03\/2021)<\/li>\n<li><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Lab2.pdf\" class=\"mtli_attachment mtli_pdf\">Lab.2 &#8211; Configuraci\u00f3n de firewall con iptables<\/a> (03\/2021)<\/li>\n<li><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Lab3.pdf\" class=\"mtli_attachment mtli_pdf\">Lab.3 &#8211; Configuraci\u00f3n de NIS con Snort<\/a> (03\/2021)<\/li>\n<li><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Lab4.pdf\" class=\"mtli_attachment mtli_pdf\">Lab.4 &#8211; An\u00e1lisis de vulnerabilidades web<\/a> (03\/2021)<\/li>\n<li><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Lab5.pdf\" class=\"mtli_attachment mtli_pdf\">Lab.5 &#8211; An\u00e1lisis de c\u00f3digo malicioso<\/a> (03\/2021)<\/li>\n<li><a href=\"http:\/\/people.ccaba.upc.edu\/careglio\/wp-content\/uploads\/2021\/07\/SI-Lab6.pdf\" class=\"mtli_attachment mtli_pdf\">Lab.6 &#8211; An\u00e1lisis forense<\/a> (03\/2021)<\/li>\n<\/ul>\n<\/h5>\n<p align=\"justify\">\n<hr>\n<h3>Competencia Transversal<\/h3>\n<h5>\n<ul>\n<li>Lab.CT &#8211; Uso solvente de recursos bibliogr\u00e1ficos<\/li>\n<\/ul>\n<\/h5>\n<p align=\"justify\">\n<hr>\n<h3>Evaluaci\u00f3n<\/h3>\n<h5>Nota Final = 0.7 * NT + 0.25 * NL + 0.05 * CT<\/p>\n<ul>\n<li>Nota de Teoria (NT) = (C1 + C2 + C3) \/ 3<\/li>\n<ul>\n<li>C1: Primer control<\/li>\n<li>C2: Segundo control<\/li>\n<li>C3: Tercer control<\/li>\n<\/ul>\n<p align=\"justify\">\n<li>Nota del Laboratorio (NL) = 0.5 * ML + 0.50 * EL<\/li>\n<ul>\n<li>ML: Media de los 6 laboratorios<\/li>\n<li>EL: Examen de laboratorio<\/li>\n<\/ul>\n<p align=\"justify\">\n<li>CT: Nota Competencia Transversal<\/li>\n<\/ul>\n<p align=\"justify\">\n<\/h5>\n<hr>\n<h3>Bibliograf\u00eda<\/h3>\n<h5>\n<ul>\n<li>W. Stallings, <em>Network security essentials: applications and standards<\/em>, Pearson Education, 2011, ISBN: 0136108059<\/li>\n<li>W. Stallings, <em>Cryptography and network security: principles and practice<\/em>, Prentice Hall, 2014, ISBN: 9780273793359<\/li>\n<li>W. Stallings, <em>Computer Security: Principles and Practice<\/em>, Prentice Hall, 2014, ISBN: 9780132775069<\/li>\n<li>A. J. Menezes, P. C. Van Oorschot, S. A. Vanstone, <em>Handbook of applied cryptography<\/em>, CRC Press, 1997, ISBN: 0-8493-8523-7<\/li>\n<li>C. Adams, S. Lloyd, <em>Understanding PKI: concepts, standards, and deployment considerations<\/em>, Addison-Wesley, 2003, ISBN: 0-672-32391-5<\/li>\n<\/ul>\n<\/h5>\n","protected":false},"excerpt":{"rendered":"<p>Seguretat Inform\u00e0tica (SI) es una asignatura obligatoria de la especialidad Tecnolog\u00edas de la informaci\u00f3n del grado de Ingenier\u00eda Inform\u00e1tica de 6 cr\u00e9ditos. SI consiste de clases te\u00f3ricas de 3 horas semanales y de practicas en laboratorio de 2 horas cada 2 semanas. El objetivo de esta <a class=\"more-link\" href=\"https:\/\/people.ccaba.upc.edu\/careglio\/index.php\/teaching\/seguretat-informatica\/\">Continue reading <span class=\"screen-reader-text\">  Seguretat Inform\u00e0tica<\/span><span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":69,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"class_list":["post-2129","page","type-page","status-publish","hentry"],"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/people.ccaba.upc.edu\/careglio\/index.php\/wp-json\/wp\/v2\/pages\/2129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.ccaba.upc.edu\/careglio\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/people.ccaba.upc.edu\/careglio\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/people.ccaba.upc.edu\/careglio\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/people.ccaba.upc.edu\/careglio\/index.php\/wp-json\/wp\/v2\/comments?post=2129"}],"version-history":[{"count":0,"href":"https:\/\/people.ccaba.upc.edu\/careglio\/index.php\/wp-json\/wp\/v2\/pages\/2129\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/people.ccaba.upc.edu\/careglio\/index.php\/wp-json\/wp\/v2\/pages\/69"}],"wp:attachment":[{"href":"https:\/\/people.ccaba.upc.edu\/careglio\/index.php\/wp-json\/wp\/v2\/media?parent=2129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}