UNIVERSIDADE FEDERAL DE ITAJUBÁ Itajubá, 12 de Março de 2025

Resumo do Componente Curricular

Dados Gerais do Componente Curricular
Tipo do Componente Curricular: DISCIPLINA
Tipo de Disciplina:
Forma de Participação:
Unidade Responsável: COORDENAÇÃO DE CURSO DE PÓS-GRADUAÇÃO DE ENGENHARIA ELÉTRICA (11.45.15)
Código: EC343E
Nome: INTRODUCTION TO CYBERSECURITY
Carga Horária Teórica: 45 h.
Carga Horária Prática: 0 h.
Carga Horária Total: 45 h.
Pré-Requisitos:
Co-Requisitos:
Equivalências:
Excluir da Avaliação Institucional: Não
Matriculável On-Line: Sim
Horário Flexível da Turma: Não
Horário Flexível do Docente: Sim
Obrigatoriedade de Nota Final: Sim
Pode Criar Turma Sem Solicitação: Não
Necessita de Orientador: Não
Exige Horário: Sim
Permite CH Compartilhada: Não
Quantidade de Avaliações: 1
Ementa/Descrição: This course covers foundation knowledge and essential skills in all security domains in the cyber world - information security, systems security, network security, mobile security, physical security, ethics and laws, related technologies, defense, and mitigation techniques use in protecting businesses. Content: 1) Introduction to Cybersecurity: Describe the characteristics of criminals and experts in the cybersecurity world. 2) The Cybersecurity Cube: Describe how the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures. 3) Cybersecurity Threats, Vulnerabilities and Attacks: Describe cyber criminals' tactics, techniques and procedures. 4) The Art of Protecting Secrets: Describe how technologies, products and procedures are used to protect confidentiality. 5) The Art of Ensuring Integrity: Describe how technologies, products and procedures are used to ensure integrity. 6) The Five Nines Concept: Describe how technologies, products, and procedures provide high availability. 7) Protecting a Cybersecurity Domain: Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network. 8) Case studies in Cybersecurity. Upon completion of the course, students will be able to perform the following tasks: Describe the characteristics of criminals and experts in the cybersecurity world. Describe how the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures. Describe the tactics, techniques and procedures used by cybercriminals. Describe how technologies, products and procedures are used to protect confidentiality. Describe how technologies, products and procedures are used to ensure integrity. Describe how technologies, products and procedures provide high availability. Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the net.
Referências: 1. VACCA, John R. "Computer and Information Security Handbook". 2nd Edition. Newnes, 2012. 1200 pages. ISBN 0123946123, 9780123946126. 2. KIM, David and SOLOMON, Michael G. "Fundamentals of Information Systems Security". Jones & Bartlett Publishers, 2016. 548 pages. ISBN 128411645X, 9781284116458. 3. Information Security and Cryptology – ICISC 2006: 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, Volume 4296 de Lecture Notes in Computer Science Security and Cryptology. Min Surp Rhee, Byoungcheon Lee. Springer, 2006. ISBN 3540491147, 9783540491149. 4. SKOPIK, Florian and SMITH, Paul Dr."Smart Grid Security: Innovative Solutions for a Modernized Grid". Syngress, 2015. 324 pages. ISBN 0128023546, 9780128023549.5. ANDERSON, Ross. “Security Engineering: A Guide to Building Dependable Distributed Systems”. Wiley; 3rd edition (December 22, 2020). 1232 pages. ISBN-10: 1119642787. ISBN- 13: 978-1119642787. 6. SYNGRESS. "Cisco Security Professional's Guide to Secure Intrusion Detection Systems". ITPro collection, Elsevier, 2003. 656 pages. ISBN 0080476546, 9780080476544. 7. SING, Simon. “The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography”. Anchor; Reprint edition (August 29, 2000). 432 pages. ISBN-10 : 0385495323. ISBN-13 : 978-0385495325. 8. MEEUWISSE, Raef. “Cybersecurity for Beginners”. Cyber Simplicity Ltd; 2nd ed. edition (March 14, 2017). 224 pages. ISBN-10: 1911452037. ISBN-13: 978-1911452034. 9. ERICKSON, Jon. “Hacking: The Art of Exploitation”. No Starch Press; 2nd edition (February 4, 2008). 488 pages. ISBN-10: 1593271441. ISBN-13: 978-1593271442. 10. CERRA, Allison. “The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security”. Wiley, August 2019. 224 Pages. ”. ISBN: 978-1-119- 44213-4. 11. BROOKS, Charles J. et Al. “Cybersecurity Essentials”. Sybex; 1st edition (September 20, 2018). 784 pages. ISBN-10: 9781119362395. ISBN-13: 978-1119362395. 12. Kohnke , Anne et al. “The Complete Guide to Cybersecurity Risks and Controls (Internal Audit and IT Audit)”. 1st Edition. Auerbach; 1st edition (April 7, 2016). 342 pages. ISBN-10: 1498740545. ISBN-13: 978-1498740548. 13. HUBBARD, Douglas W. et al. “How to Measure Anything in Cybersecurity Risk”. Wiley; 1st edition (July 25, 2016). 275 pages. ISBN-13: 978-1119085294. ISBN-10: 1119085292. 14. ZETTER, Kim. “Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon”. Crown; (September 1, 2015). 448 pages. ISBN-10: 9780770436193. ISBN- 13: 978-0770436193. 15. ACKERMAN, Pascal. “Industrial Cybersecurity: Efficiently monitor the cybersecurity posture of your ICS environment”. Packt Publishing; 2nd ed. edition (October 7, 2021). 800 pages. ISBN-10: 1800202091. ISBN-13: 978-1800202092. 16. ACKERMAN, Pascal. “Industrial Cybersecurity: Efficiently Secure Critical Infrastructure Systems”. Packt Publishing, 2017. 456 pages. ISBN 1788395158, 9781788395151. 17. PAAR, Christof. “Understanding Cryptography: A Textbook for Students and Practitioners”. Springer; 2010th edition (November 8, 2014). 390 pages. ISBN-10: 3642446493. ISBN-13: 978-3642446498. 18. WARD, David and WOODERSON, Paul. "Introduction to Automotive Cybersecurity," in Automotive Cybersecurity: An Introduction to ISO/SAE 21434 , SAE, 2021, pp.1-6. 19. SHAW, William T. “Cybersecurity for SCADA Systems”. PennWell Corporation, 2006. 562 pages. ISBN: 1593700687, 9781593700683. 20. KNAPP, Eric D. and SAMANI, Raj. “Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure”. Newnes, 2013. 224 pages. ISBN: 012404638X, 9780124046382. 21. LESZCZYNA, Rafał. “Cybersecurity in the Electricity Sector: Managing Critical Infrastructure”. Springer Nature, 2019. 213 pages. ISBN: 3030195384, 9783030195380.

SIGAA | DTI - Diretoria de Tecnologia da Informação - (35) 3629-1080 | Copyright © 2006-2025 - UFRN - sigaa08.unifei.edu.br.sigaa08 vSIGAA 4.12.14_U.139