Accreditations
Programme Structure for 2024/2025
Programming Fundamentals
By the end of this course unit, the student should be able to:
LO1: Apply fundamental programming concepts.
LO2: Create procedures and functions with parameters.
LO3: Understand the syntax of the Python programming language.
LO4: Develop programming solutions for problems of simple complexity.
LO5: Explain, execute, and debug code fragments developed in Python.
LO6: Interpret the results obtained from the execution of code developed in Python.
LO7: Develop programming projects.
S1. Introduction to Programming: Logical sequence and instructions, Input and output of data, Constants, variables, and data types, Logical, arithmetic, and relational operations, Control structures
S2. Procedures and Functions
S3. References and Parameters
S4. Integrated Development Environments
S5. Syntax of the programming language
S6. Objects and object classes
S7. Lists and Lists of Lists
S8. File Manipulation
The course unit follows a project-based assessment model due to its highly practical nature and does not include a final exam.
Students are evaluated based on the following parameters:
A1: Programming tasks validated by the instructors (10%), with a minimum grade of 9.5 out of 20 in the average of the tasks.
A2: Individual Project with theoretical-practical discussion (40%), with a minimum grade of 8.5 out of 20.
A3: Group Project with theoretical-practical discussion (50%), with a minimum grade of 8.5 out of 20.
Title: Wanda Dann, Stephen Cooper, & Randy Pausch, Learning to Program with Alice!, 2011, ISBN: 978-0132122474
João P. Martins, Programação em Python: Introdução à programação com múltiplos paradigmas, IST Press, 2015, ISBN: 9789898481474
Kenneth Reitz, Tanya Schlusser, The Hitchhiker's Guide to Python: Best Practices for Development, 1st Edition, 2016, ISBN-13: 978-1491933176, https://docs.python-guide.org/
Eric Matthes, Python Crash Course, 2Nd Edition: A Hands-On, Project-Based Introduction To Programming, No Starch Press,US, 2019, ISBN-13 : 978-1593279288
John Zelle, Python Programming: An Introduction to Computer Science, Franklin, Beedle & Associates Inc, 2016, ISBN-13 : 978-1590282755
Ernesto Costa, Programação em Python: Fundamentos e Resolução de Problemas, 2015, ISBN 978-972-722-816-4,
Authors:
Reference:
Year:
Title: David Beazley, Brian Jones, Python Cookbook: Recipes for Mastering Python 3, O'Reilly Media, 2013, ISBN-13 ? : ? 978-1449340377
Authors:
Reference:
Year:
Introduction to Cybersecurity
At the end of this course, the student should be able to:
LO1. Understand cybersecurity in its different perspectives
LO2. Understand the main security challenges and threats that organisations and users have to face;
LO3. Introduce the legal, ethical and strategic context of information security
LO4. Identify and manage information security risk;
LO5. Know and apply appropriate security technologies for risk mitigation;
LO6. Know mechanisms for the management and maintenance of information security environments.
SC1. Introduction to Cybersecurity: main components; cybersecurity pillars; cybersecurity frameworks.
SC2. Information Security Planning and Legal and Ethical Framework
SC3. Principles of Information Security Governance and Risk Management
SC4. Introduction to Information Security Technology: access controls, firewalls, vpns, idps, cryptography and other techniques.
SC5. Physical Security: physical access control mechanisms, physical security planning, among others.
SC6. Information Security Implementation: information security project management; technical and non-technical aspects of information security implementation.
SC7. Personnel Security: personnel security considerations; personnel security practices.
SC8. Maintenance of Information Security.
Periodic Assessment:
- Realisation of a set of group projects and activities (60%) throughout the semester
- Two individual tests (40%) [minimum score of 6 points for each test].
Attendance of a minimum number of classes is not compulsory in Periodic assessment.
Assessment by examination:
For students who opt for this process or for those who fail the periodic assessment process, with 3 epochs under the RGACC.
Title: Whitman, M., Mattord, H. (2017). Principles of Information Security. Course Technology.
Whitman, M., & Mattord, H. (2013). Management of information security. Nelson Education.
Andress, J. (2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress.
Kim, D., Solomon, M. (2016). Fundamentals of Information Systems Security. Jones & Bartlett Learning.
Authors:
Reference:
Year:
Title: Conjunto de artigos, páginas web e textos que complementam a informação bibliográfica da unidade curricular, e que serão fornecidos pela equipa docente.
Authors:
Reference:
Year:
Applied Mathematics
LG1. Review the concept of function and its properties. Types of functions and operations with functions.
LG2. Graphics of elementar functions and function transformations.
LG3. Limits, indeterminations and graphic interpretation. Continuity.
LG4. Derivatives and its applications. Graphic interpretation.
LG5. Linear approximations and higher order approximations.
LG6. Derivative of composed functions and inverse functions.
LG7. Calculations with matrices and vectors.
LG8. Calculating detrminants and applicating its proprieties.
LG9. Knowing the concept of linear transformation and representation with matrices.
LG10. Calculating eigenvalues and eigenvectors.
PC1. Function. Elementar functions, Different type of functions. Operations with functions. Logaritmic and trigonometric functions.
PC2. Limits of a function at a point, Continuity at a point. Assimptotic lines.
PC3. Derivative of a function at a point. Derivative rules. Optimization problems.
PC4. Derivative of composed functions – chain rule. Derivative of the inverse function.
PC5. Linear approximation and Taylor approximation.
PC6. Solving linear equation systems. Matrices and operations. Inverting matrices. Determinants and properties. Linear transformations.
PC7. Real vector space. Inner product. Parallelism and perpendicularity.
PC8. Eigenvalues, eigenvectores and matrix diagonalization.
Approval with classification not less than 10 points (1-20 scale) in one of the following modalities:
- Periodic assessment: 3 mini-tests (MT) on classes of 30 minutes duration (MT1: 5%, MT2: 15%, MT3: 15%) + Test on the first examination period (40%) + weekly tasks on Moodle (15%) + work done in groups of 2-3 students (10%).
The average of the classifications of mini-tests 2 and 3 ( (MT2+MT3)/2 ) must be greater or equal to 7 points.
The classification in the final test must be greater or equal to 7 points.
There is the possibility of oral assessment.
or
- Assessment by Examination (100%), in any of the examination periods.
Title: Stewart, J., Stewart, J. (2013). Cálculo, Vol I, Cengage Learning, (7a Ed.), 2013, null,
Cabral I., Perdigão, C. e Saiago, C., Cabral I., Perdigão, C. e Saiago, C. (2018). Álgebra Linear: Teoria, Exercícios Resolvidos e Exercícios Propostos com Soluções, Escolar Editora, 2018, null,
Materiais científico-pedagógicos (slides, notas de desenvolvimento, código e pseudo código, fichas de exercícios e problemas) disponibilizados pela equipa docente
Scientific-pedagogical materials (slides, lectures, code and pseudo code, exercise sheets, problems) provided by the teaching team.
Authors:
Reference:
Year:
Title: Campos Ferreira, J., Campos Ferreira, J. (2018). Introdução à Análise Matemática, Fundação Calouste Gulbenkian, 2018, null,
Goldstein, L., Goldstein, L. (2011). Matemática Aplicada a Economia. Administração e Contabilidade, (12a edição) Editora Bookman, 2011, null,
Strang, G., Strang, G., (2007) Computational Science and Engineering, Wellesley-Cambridge Press., 2007, null,
Authors:
Reference:
Year:
Operating Systems and Virtualization
LO1: Know the basic principles of operation of a computer system;
LO2: Present the principles of hardware and software and indicate their combination in a computer;
LO3: Recognise the components and typical architectures of computers;
LO4: To know the structure, functions and operation of an Operating System (OS);
LO5: To know the different types of operating systems and their intrinsic characteristics;
LO6: To know the mechanisms of virtualization of systems.
S1: Introduction to numbering bases and base 2,8,16 codes; Calculations in various numbering bases; Encoding and representation of information (ASCII code and others).
S2: Computer structure: Motherboard, CPU, memories, stack, bus, storage system, graphics cards, communication ports, peripherals.
S3: Operating System Components: Processes; Memory; Stack; Input and Output; File System; Administration and Security.
S4: Study of Operating System commands: Linux and Windows.
S5: Virtualization environments: VMware; VirtualBox; Proxmox, others.
S6: Creation and use of virtual machines: Linux (Ubuntu, Fedora, CentOS, others) for workstations, for servers (e-mail, VoIP, storage); Windows (11, server); Networking of virtual machines.
Course with Periodic Assessment, not by Final Exam. Presence required in 90% of all the activities.. Assessment weights:
Individual practical assignments, 80% of which are compulsory (25%)
Lab project (in group of 4), with individual oral discussion (50%)
2 multiple response Mini-tests (25%)
Failing the regular season (< 10 val): able to access 2nd season exam (50% of the grade), replacing the individual works and mini-tests, being compulsory the approval in the group lab project (50%).
Title: "Andrew Tanenbaum, Todd Austin, ""Structured Computer Organization"", 6th Edition, Pearson, 2012, ISBN: ? 978-0132916523
Guilherme Arroz, José Monteiro, Arlindo Oliveira, ""Arquitectura de Computadores: dos Sistemas Digitais aos Microprocessadores - 2ª Edição"", IST Press, 2009.
Morris Mano, Charles Kime, ""Logic and Computer Design Fundamentals"", 5th Edition, Prentice Hall, 2015, ISBN: 978-1292096070
Abraham Silberschatz, Peter Galvin, Greg Gagne,""Operating Systems Concepts Essentials"", 2nd edition, Wiley, 2013, ISBN: 978-1118804926
Andrew S. Tanenbaum and Herbert Bos, ""Modern Operating Systems (4th Edition)"", Pearson Prentice-Hall, 2014, ISBN: 978-0133591620
William Stallings, ""Operating Systems Internals and Principles"", 9th edition, Pearson, 2017, ISBN: 978-0134670959
Matthew Portnoy, ""Virtualization Essentials"", 2nd Edition, 2016, Sybex, ISBN: 978-1119267720
Shashank Mohan Jain, ""Linux Containers and Virtualization: A Kernel Perspective"", Apress, 2020, ISBN: 978-14842
Authors:
Reference:
Year:
Title: José Alves Marques, Paulo Ferreira, Carlos Ribeiro, Luís Veiga, Rodrigo Rodrigues, ""Sistemas Operativos"", FCA, 2012, ISBN 978-972-722-575-0
Paulo Trezentos e António Cardoso, ""Fundamental do Linux"", 3ª Edição, FCA, 2009, ISBN: 978-972-722-514-9
Abraham Silberschatz, ""Operating System Concepts"", 10th Edition, Wiley, 2018, ISBN: 978-1119456339
Conjunto de materiais a disponibilizar pela equipa docente.
Authors:
Reference:
Year:
Algorithms and Data Structures
At the end of the course, students should be able to:
LO1: Create and Manipulate Data Structures
LO2: Apply the most appropriate sorting and search algorithms for a specific problem
LO3: Analyze the complexity and performance of an algorithm
LO4. Identify, implement, and analyze the most appropriate data structures and algorithms for a certain problem
S1. The Union-Find data structure
S2. Algorithm analysis
S3: Data structures: stacks, queues, lists, bags
S4: Elementary sorting: selectionsort, insertionsort, shellsort
S5: Advanced sorting: mergesort, quicksort, heapsort
S6. Complexity of sorting problems
S7: Priority Queues
S8. Elementary symbol tables
S9. Binary search trees
S10. Balanced search trees
S11. Hash tables
Season 1: Periodic Assessment or Final Exam
Periodic Assessment:
-2 Tests (90%), with a theoretical and practical component. Minimum final average of 9.5, distributed as follows: (45%) Test 1 with a minimum score of 7.5 and (45%) Test 2 with a minimum score of 7.5
-(10%) Application and demonstration of knowledge tasks
Final Exam:
- (100%) Final Exam with a theoretical and practical component
Students have access to the Exam assessment in Season 1 if they choose it at the beginning of the semester or if they fail the Periodic Assessment.
Season 2: Final Exam
- (100%) Final Exam with a theoretical and practical component
Special Season: Final Exam
- (100%) Final Exam with a theoretical and practical component
Title: Para as licenciaturas Python: Python - Algoritmia e Programação Web, FCA,
Para as licenciaturas Java: Estruturas de Dados e Algoritmos em Java, FCA
Introduction to Algorithms, 3rd edition, MIT Press,
Algorithms, 4th edition, Addison-Wesley, 2012
Authors:
Reference:
Year:
Applied Mathematics Complements
LG1 Dominate the concepts of sequence and numerical series
LG2 Calculate limits of sequences and, relative to a series, find out the existence of sum
LG3 Understand the generalization of the concept of series to functional series and obtain the convergence domain
LG4 Understand the definition of integral as the limit of Riemann sums
LG5 Calculate primitives and apply them to determine the value of integrals
LG6 Apply integrals to calculate areas, lengths and mean values
LG7 Solve 1st order linear ordinary differential equations (ODEs) by separating variables
LG8 Calculate partial derivatives and directional derivative
LG9 Interpret the gradient vector as the direction of maximal increase of a function
LG10 Decide about the existence of a tangent plane
LG11 Obtain the 1st order Taylor development and, explore numerically in higher order
LG12 Obtain unconstrained and constrained extrema(otimization)
LG13 Articulate the various approaches to content, graphical, numerical and algebraic
PC1 Sequences. Monotony. Bounded sequences. Geometric progression
PC2 Convergence of sequences
PC3 Numerical series, partial sums and sum
PC4 Convergence criteria of series of non-negative terms
PC5 Simple and absolute convergence of alternating series. Leibniz's criterion
PC6 Power series and domain of convergence
PC7 Riemann definite integral. Fundamental theorem of calculus and antiderivatives
PC8 Integration by parts and change of variables. Decomposition into simple fractions
PC9 Applications of integral (area, length, mean value)
PC10 Improper integral and convergence
PC11 First order linear ODE
PC12 Multivariable real functions. Level curves. Limits and continuity
PC13 Partial derivatives at a point and gradient vector. Linear approximation, tangent plane and differentiability
PC14 Directional derivative. Chain rule. Taylor's polynomials and series
PC15 Quadratic forms and otimization problems
Approval with classification >=10 points (1-20 scale) in one of the following modalities:
-Continuous assessment: Test 1 (10%) + Test 2 (20%) + practical work in Python (10%) + autonomous work (10%) + Final Test (40%). The average of the 2 tests and the classification on the final test must be >=7 points (1-20 scale). In case of big differences in the classifications on tests and final test, an oral assessment might be necessary.
-Assessment by Exam (100%), in any of the exam periods
Title: [1] Stewart, J. (2013). Cálculo, Vol I, Cengage Learning, (7ª Ed.)
[2] Campos Ferreira, J. (2018). Introdução à Análise Matemática, Fundação Calouste Gulbenkian
[3] Lipsman, R.L., Rosenberg, J.M. (2018) Multivariable Calculus with MATLAB, Springer
[4] Hanselman, D., Littlefield, B. and MathWorks Inc. (1997) The Student Edition of MATLAB, 5th Version, Prentice-Hall
Authors:
Reference:
Year:
Introduction to Computer Networks
On completion of this course, students will be able to:
LO1. Know the basic operating principles of a computer network
LO2. Know and understand the OSI and TCP/IP reference models
LO3. Know how the main protocols used in everyday life work, particularly HTTP
LO4. Know and understand how protocols work at transport level.
LO5. Know how to interconnect devices in a wired network.
LO6. Be able to design, configure and manage a computer network
CP1. Introduction to computer networks and presentation of the OSI and TCP/IP reference models
CP2. Introduction to the physical and data link layer. Installation and configuration of a switch
CP3. Introduction to the network layer: IPv4 and IPv6 addressing; IPv4 protocol and creating subnets.
CP4. Packet forwarding; Operation and configuration of a router.
CP5. Exploring TCP/UDP transport protocols. Congestion control.
CP6. Exploring the application layer: DNS, E-mail and File Transfer.
CP7. Configuring firewalls
CP8. Computer network management
It can be accomplished in one of the following ways:
1. Periodic assessment:
Theoretical component
-1st test to be taken in the middle of the semester (30%);
-2nd test to be taken at the end of the semester (30%).
(there is also the possibility of doing a final exam (60%) for those who have failed the 1st and/or 2nd tests)
Practical component
-3 laboratories to be carried out in groups (15%);
-1 practical group assignment and its presentation (25%).
Note: Both tests and laboratories have a minimum mark of 8 values, and it should be noted that the practical component is mandatory for the purposes of approval in the periodic assessment. The minimum mark for passing the course is 10 values.
2. Exam evaluation:
- It is available in the first or second seasons
- Written exam (100%)
The minimum mark for passing the course is 10 values.
Title: -Kurose J., Keith Ross K. (2017). Computer networking: a top-down approach. Pearson. ISBN: 978-0-13-359414-0;
-Tanenbaum A., Wetherall D. (2021). Redes de Computadores. Bookman. ISBN: 9788582605608.
Authors:
Reference:
Year:
Title: -Boavida F., Monteiro E. (2021). Engenharia de Redes Informáticas. FCA Editora. ISBN: 9789727226948.
Authors:
Reference:
Year:
Project Planning and Management
The objective of the UC is to develop a technological project in line with the scope of the Course. Contact will be established with project planning considering the main phases: Requirements analysis, development, partial tests and final tests and changes. Contact with laboratory equipment and tools is one of the goals for designing a software, hardware or both project.
I. Introduction to technological innovation along the lines of Europe
II. Planning a technological project and its phases
III. Essential aspects for the development of a project
IV. Definition of material resources
V. Budget of a project
VI. Partial and joint Test Plan
VII. Presentation of a technological project
VIII. Technological project demonstration
IX. Preparation of Technical Report
Periodic grading system:
- Group project: first presentation: 30%; second presentation and exibithion: 40%; final report: 30%. The presentations, demonstrations and defence are in group.
Title: Lester A. / 7th edition, Elsevier Science & Technology., Project Management Planning and Control, 2017, ·, ·
Tugrul U. Daim, Melinda Pizarro, e outros / Spinger, Planning and Roadmapping Technological Innovations: Cases and Tools (Innovation, Technology, and Knowledge Management), 2014, ·, ·
Authors:
Reference:
Year:
Work, Organizations and Technology
LO1: Know the main theories, concepts and problematics related to Work, Organizations and Technology;
LO2: Understand the main processes of the digital transition directly related to the world of work and its organizations;
LO3: Analyze the multiple social, economic and political implications of the digital transition;
LO4: Explore cases, strategies and application methods to understand the real impacts of the digital transition on professions, companies and organizations.
S1. Is work different today than in the past? S2. How has theory looked at technology?
S3. What technologies for the future?
S4. What future for work?
S5. How intelligent is artificial intelligence?
S6. Where does precarity begin?
S7. Do platform workers need employment contracts?
S8. Who is to blame when the machine goes wrong?
S9. Are digital technologies changing the relationship between unions and companies?
S10. Does teleworking make people happier?
S11. Portugal and the digital transformation?
"Periodic evaluation:
Making of an Inverted class class. Each Inverted Class represents 20% of the final mark, with a minimum mark of 8. Weekly question and answer which represents 10% of the final mark, with a minimum mark of 8. An individual assignment, spread over 3 assessment periods, with a minimum mark of 8 in each, representing 35% of the final grade. A group assignment, representing a total of 35% (10% group presentation and 25% written assignment), with a minimum mark of 8. The average grade must be equal to or greater than 9.5.
Assessment by exam (First season 1 if the student chooses, Second Season and Special Season): In-person exam (100% of the final grade)."
Title: Autor, David H., "Why Are There Still So Many Jobs? The History and Future of Workplace Automation.", 2015, Journal of Economic Perspectives, 29 (3): 3-30.
Benanav, A, Automation and the Future of Work, 2020, London: Verso
Boreham, P; Thompson, P; Parker, R; Hall, R, New Technology at Work, 2008, Londres: Routledge.
Crawford, C, The Atlas of AI. Power, Politics, and the Planetary Costs of Artificial Intelligence, 2021, Yale University Press.
Edgell, S., Gottfried, H., & Granter, E. (Eds.). (2015). The Sage Handbook of the sociology of work and employment.
Grunwald, A. (2018). Technology Assessment in Practice and Theory. London: Routledge.
Huws, U. (2019) Labour in Contemporary Capitalism, London, Palgrave.
OIT (2020), As plataformas digitais e o futuro do trabalho
Agrawal A, Gans J, Goldfarb A (2018), Prediction Machines, Boston, Massachusetts, Harvard Business Review Press.
Autor D (2022), The labour market impacts of technological change, Working Paper 30074, NBER Working Paper Series.
Authors:
Reference:
Year:
Title: Berg J, Furrer M, Harmon E, Rani U, Silberman M (2020), As plataformas digitais e o futuro do trabalho, Geneva, International Labour Office.
Braun J, Archer M, Reichberg G, Sorondo M (2021), Robotics, AI and Humanity, Cham, Springer.
Degryse, Cristophe (2016), Digitalisation of the Economy and its Impact on Labour Markets, WP 2016.2, ETUI
ILO (2018), The economics of artificial intelligence: Implications for the future of work, Geneva, International Labour Office.
ILO (2019) Work for a Brighter Future – Global Commission on the Future of Work. Report. Geneva, International Labour Office.
Lane M, Saint-Martin A (2021), The impact of Artificial Intelligence on the labour market: What do we know so far?, OECD.
OECD (2019b), How’s Life in the Digital Age?, OECD Publishing, Paris.
Valenduc, Gérard & Vendramin, Patricia (2019), The mirage of the end of work, FB 6/2019, ETUI
WEF (2023), Future of Jobs Report 2023, Geneva, World Economic Forum.
Zuboff S (2019), The Age of Surveillance Capitalism, PublicAffairs.
Authors:
Reference:
Year:
Public Speaking with Drama Techniques
Learning Outcomes:
LO1. Develop oral communication skills
LO2. Improve body expression
LO3. Master the art of using the vocal apparatus
LO4. Learn performance techniques
Compatibility with the Teaching Method:
The course combines theory and practice, providing students with an immersive experience in the world of public performances with theatrical techniques. The teaching method is interactive and participatory, encouraging students to put into practice the concepts learned through individual and group exercises.
The knowledge acquired involves both theatrical theory and specific oral communication techniques. Participants will learn about the fundamentals of vocal expression, character interpretation and improvisation, adapting these skills to the context of public presentations
S1 - Preparation for presentation (3 hours)
S2 - Non verbal communication (3 hours)
S3 - Introduction to using the vocal apparatus (3 hours)
S4 - Introduction to the term Performance (3 hours)
Modality of continuous assessment:
Practical Presentations (50%): Participants will be assessed based on their public presentations during the course. Criteria such as clarity of communication, vocal and body expression, use of theatrical techniques and performance will be considered. Presentations may be individual or group presentations, depending on the activities proposed.
Exercises and Written Assignments (50%): In addition to the practical presentations, participants may be asked to complete exercises and written assignments related to the content covered in each module. These may include reflections on learned techniques, analysis of case studies, answers to theoretical questions or even the creation of presentation scripts. These activities will help to assess participants' conceptual understanding.
To conclude the curricular unit in the modality of continuous assessment the student must be present in 75% of the classes.
Although not recommended, students may opt for final assessment by written and oral examination (100%).
Title: -
Authors:
Reference:
Year:
Title: -
-
Authors:
Reference:
Year:
Introduction to Design Thinking
LO1. Acquiring knowledge about the fundamentals and stages of the Design Thinking process
LO2. Develop skills such as critical thinking, collaboration, empathy and creativity.
LO3. To apply Design Thinking in problem solving in several areas, promoting innovation and continuous improvement.
S1. Introduction to Design Thinking and Stage 1: Empathy (3h)
S2. Steps 2 and 3: Problem Definition and Ideation (3h)
S3. Step 4: Prototyping (3h)
S4. Step 5: Testing and application of Design Thinking in different areas (3h)
Modality of continuous assessment:
Class participation (20%): evaluates students' presence, involvement and contribution in class discussions and activities.
Individual work (40%): students will develop an individual project applying Design Thinking to solve a specific problem. They will be evaluated on the application of the stages of Design Thinking, quality of the proposed solutions, and creativity.
Group work (40%): students will form groups to develop a joint project, applying Design Thinking to solve a real challenge. Evaluation will be based on the application of the steps of Design Thinking, quality of the solutions and collaboration among group members.
To conclude the curricular unit in the modality of continuous assessment the student must be present in 75% of the classes.
Although not recommended, students may opt for final assessment by written and oral examination (100%).
Title: -
-
-
-
Authors:
Reference:
Year:
Title: -
-
-
-
Authors:
Reference:
Year:
Academic Work with Artificial Intelligence
"LO1. Knowledge about the structure, language, ethical and normative procedures for the elaboration of academic texts.
LO2. Skills to use generative algorithms to assist the elaboration of academic work.
LO3. Skills in analysing and scrutinising the independence, relevance and reliability of AI generated data.
LO4. Overall abilities to recognise the ethical and civic implications underlying the access, sharing and use of AI tools in an academic context."
"S1. Introduction to Academic Writing and generative algorithms (3h)
S2. Procedures for planning and constructing argumentative texts with the aid of AI (3h)
S3. Critical analysis of texts produced: identification and referencing of data sources and analysis of their relevance in the ligth of the objectives of the academic work (3h)
S4. Opportunities and risks of AI use: good practice guide for accessing, sharing and using AI tools in an academic context (3h)"
"Modality of continuous assessment:
Class participation: Class participation: assesses students' attendance, involvement and individual contributions to class discussions and activities (20%).
Group work will require students to form groups to revise and edit academic texts between themselves, using generative algorithms. Assessment will be based on the quality of the revisions, edits and feedback provided (40%).
Individual report: with an in-depth reflection on the civic and ethical questions posed by the use of AI tools as an aid to academic writing (40%).
There is a required minimum of 7 values in each component that is graded.
To conclude the curricular unit in the modality of continuous assessment the student must be present in, at least, 75% of the classes.
Although not recommended, students may opt for final assessment by written and oral examination (100%).
In addition to the practical presentations, students will be asked to carry out exercises and written tasks related to the content covered. These may include: reflecting on techniques learnt, analysing case studies, answering theoretical questions or even creating presentation scripts. These activities will help to assess conceptual understanding of the content taught.
Title: -
-
-
-
Authors:
Reference:
Year:
Title: -
Authors:
Reference:
Year:
Databases and Security
Upon completion of this UC students will be able to:
LO1: Understand what is an information system and its organizational role
LO2: To know how to identify requisites and to design an information system using conceptual models (such as UML)
LO3: To design relational databases using relational models and UML
LO4: To build and manipulate relational databases using SQL
LO5: To know and use the administration and security tools of a database system
LO6: To know and to design non-relational databases (document and object based)
LO7: To know and identify the main threats and vulnerabilities on databases security
LO8: To know ways of mitigating security threats in databases
SC1. Introduction to Information Systems and its role in organizations.
SC2. Requirements analysis and data modelling with UML
SC3. The relational model: relations, attributes, primary keys, foreign keys and integrity rules
SC4. SQL Language: data definition and manipulation, procedural language, data portability
SC5. Database Optimization
SC6. Transactions and concurrent access
SC7. Introduction to Database Administration. Components of a DBMS and the roles of the DBA.
SC8. Introduction to Non-Relational Databases (NoSQL)
SC9. Security threats and vulnerabilities in relational and non-relational databases.
SC10. Data Privacy: users, roles, rights, and data encryption
SC11. Database Auditing
SC12. Backup and Recovery
SC13. SQL Injection
Periodic Assessment:
- Components:
* 40% - Project;
* 60% - Individual written test (without consultation).
- Minimum score for both components: 40%.
Review for final exam:
* 100% - Written test
- Final approval: note >= 10
Title: Natan R. (2005). Implementing Database Security and Auditing. Digital Press. ISBN: 978-1555583347.
Basta A., Zgola M. (2011). Database Security. Cengage Learning. ISBN: 978-1435453906.
Sullivan D. (2015). NoSQL for mere mortals. Addison-Wesley Professional. ISBN: 978-0134023212.
Date C. J. (2015). SQL and Relational Theory: How to Write Accurate SQL Code. O'Reilly Media. ISBN: 978-1491941171.
Blaha M. (2014). UML Database Modeling Workbook. Technics Publications, LLC. ISBN: 978-1935504511.
Ramez E., Shamkant N. (2017). Fundamentals Of Database Systems. Pearson. ISBN: ? 978-0133970777.
Authors:
Reference:
Year:
Title: Bradshaw S., Brazil E., Chodorow K. (2013). Mongodb: the definitive guide: powerful and scalable data storage. O'Reilly Media. ISBN: 978-1491954461.
Litchfield D., Anley C., Heasman J., Grindlay B. (2005). The Database Hacker's Handbook: Defending Database Servers. Wiley. ISBN: 978-0764578014.
Afyouni H. (2005). Database Security and Auditing: Protecting Data Integrity and Accessibility. Cengage Learning. ISBN: 978-0619215590.
Damas L. (2017). SQL - Structured Query Language. FCA. ISBN: 978-972-722-829-4.
Ramos P. (2007). Desenhar Bases de Dados com UML, Conceitos e Exercícios Resolvidos. Editora Sílabo. ISBN: 9789726184744.
Haym D. (2011). UML and Data Modeling: A Reconciliation. Technics Publications, LLC. ISBN: 978-1935504191.
Material complementar a fornecer pela equipa docente durante o decurso das aulas.
Authors:
Reference:
Year:
Entrepreneurship and Innovation I
At the end of the learning unit, the student must be able to: LG.1. Understand entrepreneurship; LG.2. Create new innovative ideas, using ideation techniques and design thinking; LG.3. Create value propositions, business models, and business plans; LG.5. Develop, test and demonstrate technology-based products, processes and services; LG.6. Analyse business scalability; LG.7. Prepare internationalization and commercialization plans; LG.8. Search and analyse funding sources
I. Introduction to Entrepreneurship;
II. Generation and discussion of business ideas;
III. Value Proposition Design;
IV. Business Ideas Communication;
V. Business Models Creation;
VI. Business Plans Generation;
VII. Minimum viable product (products, processes and services) test and evaluation;
VIII. Scalability analysis;
IX. Internationalization and commercialization;
X. Funding sources
Periodic grading system: - Group project: first presentation: 30%; second presentation: 30%; final report: 40%.
Title: A. Osterwalder, Y. Pigneur / John Wiley & Sons, Value Proposition Design: How to Create Products and Services Customers Want, 2014, ·, ·
A. Osterwalder, Y. Pigneur / John Wiley & Sons, Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers., 2010, ·, ·
P. Burns / Palgrave Macmillan, Entrepreneurship and Small Business, 2016, ·, ·
S. Mariotti, C. Glackin / Global Edition. Pearson; Dorf. R., Byers, T. Nelson, A. (2014). Technology Ventures: From Idea to Enterprise. McGraw-Hill Education, Entrepreneurship: Starting and Operating A Small Business, 2015, ·, ·
Authors:
Reference:
Year:
Statistics and Probabilities
LG1 - Know and use the main concepts of descriptive statistics, choose appropriate measures and graphical representations to describe data
LG2 - Apply basic concepts of probability theory, namely compute conditional probabilities, and check for independence of events
LG3 - Work with discrete and continuous random variables.
LG4 - Work and understand the uniform, Bernoulli, binomial, Poisson, Gaussian distribution, as well as Chi-Square, t and F distributions
LG5 - Perform point parameter estimation and distinguish parameters from estimators
LG6 - Build and interpret confidence intervals for parameter estimates
LG7 - Understand the fundamentals of hypothesis testing
LG8 - Get familiar with some software (such Python or R)
Syllabus contents (SC):
SC1 - Descriptive statistics: Types of variables. Frequency tables and graphical representations. Central tendency measures. Measures of spread and shape.
SC2 - Concepts of probability theory: definitions, axioms, conditional probability, total probability theorem and Bayes's formula
SC3 - Univariate and bivariate random variables: probability and density functions, distribution function, mean, variance, standard deviation, covariance and correlation.
SC4 - Discrete and Continuous distributions: Uniform discrete and continuous, Bernoulli, binomial, binomial negative, Poisson, Gaussian, Exponential Chi-Square, t and F distributions.
SC 5 - Sampling: basic concepts. Most used sample distributions
SC6 - Point estimation and confidence intervals
SC7 - Hypothesis testing: types of errors, significance level and p-value
Approval with a mark of not less than 10 in one of the following methods:
- Periodic Assessment: 2 mini-tests (MT) taken in class (15% each) + Final test taken on the date of the first exam (40%) + autonomous work (10%) + group project (20%),
The average of the mini-tests ( (MT1+MT2)/2 ) has a minimum mark of 7.0.
The final test has a minimum mark of 7.0.
or
- Assessment by Exam (100%).
Title: E. Reis, P. Melo, R. Andrade & T. Calapez, Estatística Aplicada (Vol. 1) - 6ª ed, 2015, Reis, E., P. Melo, R. Andrade & T. Calapez (2015) Estatística Aplicada (Vol. 1), 6ª ed., Lisboa: Sílabo. ISBN: 978-989-561-186-7, ·
Reis, E., P. Melo, R. Andrade & T. Calapez (2016) Estatística Aplicada (Vol. 2), 5ª ed., Lisboa: Sílabo. ISBN: 978-972-618-986-2
Afonso, A. & Nunes, C. (2019). Probabilidades e Estatística. Aplicações e Soluções em SPSS. Versão revista e aumentada. Universidade de Évora. ISBN: 978-972-778-123-2
Ferreira, P.M., Estatística e Probabilidade (Licenciatura em Matemática), 2012, Ferreira, P. M. (2012). Estatística e Probabilidade (Licenciatura em Matemática). Instituto Federal de Educação, Ciência e Tecnologia do Ceará – IFCE III, Universidade Aberta do Brasil – UAB.IV. ISBN: 978-85-63953-99-5,
Farias, A. (2010). Probabilidade e Estatística. (V. único). Fundação CECIERJ. ISBN: 978-85-7648-500-1
Authors:
Reference:
Year:
Title: Haslwanter, T. (2016). An Introduction to Statistics with Python: With Applications in the Life Sciences. Springer. ISBN: 978-3-319-28316-6
Authors:
Reference:
Year:
Cybersecurity Law and Ethics
At the end of this course, the student should be able to
LO1. Understand which ethical posture to adopt as a cybersecurity professional;
LO2. Understand the ethnical and privacy implications of cybersecurity;
LO3. Understand the main national and international legislative references in the area of cyber-security;
LO4. Identify the legal and privacy requirements in cybersecurity projects.
SC1. Ethics and technological development:
- Specificity of ethical issues in Information and Communication Technology.
- Responsibility in engineering.
- Applied ethics and regulatory gaps.
- Ethics and Cyber-security.
SC2. Main Cybersecurity Legal Frameworks:
- The national and international cybersecurity strategy.
- Privacy and personal data protection: The RGPD, Law 58/2019 and Law 59/2019.
- The protection of privacy in the electronic communications sector: The e-privacy directive 2002/58/EC (amended by 2009/136/EC) and Law No. 41/2004 (amended by Law No. 46/2012).
- Law on Cybercrime (109/2009).Legal regime for security in cyberspace: The NIS Directive 2016/1148 and Law no. 46/2018. International standards and technical specifications: ISO 27001. The Implementing Regulation (EU) 2018/151. Resolution of the Council of Ministers no. 41/2018, of 28 March.
Periodic Assessment:
- Group resolution of case studies (40%), with two submissions during the semester.
- Individual Test (60%)
The group work for the case study has a minimum evaluation of 7/20 points.
Final Exam:
- Written Test (100%)
The students that fail the periodic assessment have two periods of examination (1st and appeal). The mark of the case studies is not considered for students who choose to take the exam. Students who choose to take the periodic assessment must do both components of it.
Title: European Union Agency for Fundamental Rights, The Handbook on European data protection law, 2019, -, http://fra.europa.eu/en/publication/2018/handbook-european-data-protection-law-2018-edition
Poel I., Royakkers L. (2011). Ethics, Technology, and Engineering: An Introduction., Wiley-Blackwell.
Nunes D. (2020). Os Crimes Previstos na Lei do Cibercrime. Gestlegal. ISBN: 9789898951502.
Authors:
Reference:
Year:
Title: Sara Baase, A gift of fire : social, legal, and ethical issues for computing technology, 2013, 4th edition,
Pedro Dias Venâncio, Lei do Cibercrime : Anotada e Comentada, 2023, Editora D’ideias ISBN: 9789895398614,
Adela Cortina, Ética Mínima, 2020, Editora Tecnos,
Bynum, Ward T., Rogerson S., Computer Ethics and Professional Responsibility: Introductory Text and Readings. Oxford: Blackwell., 2004, -,
Cordeiro, A.B.N., Direito da Proteção de Dados à luz do RGPD e da Lei n.º 58/2019, Edições Almedina., 2020, -,
Gomes M, Gomes M. (2006). O Código da Privacidade e da Protecção de Dados Pessoais na Lei e na Jurisprudência (nacional e internacional). Edições Centro Atlântico. ISBN: 9789896150228., 2006, -,
Conjunto de materiais e legislação a ser fornecido pela equipa docente.
Authors:
Reference:
Year:
Computer Networks Security
Upon completion of this course students will be able to:
LO1. Understand the most common threats, attacks and vulnerabilities in computer networks
LO2. To know and understand the various security mechanisms for each network layer in the reference models
LO3. Know and explore security problems in several network protocols
LO4. To identify, analyse and correct security problems in computer networks.
SC1. Risks, Threats and Attacks to Communication Networks
SC2. Security at the Physical and Connection Level: Ethernet Networks; Attacks and Defenses; Security in Wi-Fi 802.11 Networks
SC3. Network Level Security: IPv4 and IPv6 Security; IPSEC Protocol; Attacks on protocols (ICMP, ARP and DHCP)
SC4. Transport level security: SSL/TLS protocol; SSH protocol; Virtual Private Networks: IPSEC and OpenVPN
SC5. Application-level security: DNS security; Secure e-mail; Secure file transfer
SC6. Firewalls: Typologies and security polivies configuration.
SC7. Intrusion Detection and Prevention: Types of systems (IDS, IPS, Network or Host-based). Honeynets and Honeypots. Usage and security configuration.
There are two possible modes as follows:
1. Periodic evaluation:
- Two written tests carried out during the semester with a minimum mark of 8 (in 20) in each test (30% + 30%)
- Three lab experiments in group (15%), with a minimum mark of 8 in each lab
- One practical work in group, including its oral presentation, with a minimum mark of 8 (25%)
2. Exam evaluation:
- Written exam (100%)
Title: Stallings, W. (2016). Network Security Essentials: Applications and Standards. Pearson.
Kurose, J., Ross, K. (2021). Computer Networking: A Top-Down Approach. 2021.
Peterson, L., Davie, B. (2021). Computer Networks: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.
Stewart, M., Kinsey, D. (2020). Network Security, Firewalls, and VPNs (ISSA). Jones & Bartlett Learning.
Zuquete, A. (2018). Segurança em Redes Informáticas. FCA.
Ciampa, M. (2017). CompTIA Security+ Guide to Network Security Fundamentals. Cengage Learning.
Authors:
Reference:
Year:
Title: Conjunto de material a fornecer aos alunos durante as aulas pela equipa docente.
Authors:
Reference:
Year:
Digital Forensic Analysis
Upon completion of this course students will be able to:
LO1. Understand the theme of digital forensic analysis, its historical context and legal framework
LO2. Discuss the effects of the use of IT systems, including the traces left as a side effect of normal day-to-day activities
LO3. Understand the methodologies, processes and fundamentals of digital forensic analysis: evidence gathering, investigation and reporting
LO4. Know the main software tools and techniques for conducting digital forensic investigations
SC1. Effects of the use of digital systems and the traces of the activities of their use
SC2. Overview of the digital investigation process, obtaining digital evidence and legal framework
SC3. Process of obtaining digital evidence in multiple systems
SC4. Digital investigation process
- Acquisition of data from physical storage devices
- Limitations in acquiring digital evidence
- Study of file systems with main focus on Microsoft Windows & Linux systems
- File system analysis and file recovery
- File structure analysis and document analysis
- In-memory information analysis
- E-mail analysis
- Internet artefacts analysis
SC5. Present and explore software tools for conducting forensic investigations
SC6. Writing forensic analysis reports and presenting evidence.
Periodic Assessment:
- Individual test (40%)
- Laboratories cases (20%)
- Development of a Group Project (40%)
Students who fail the periodic assessment may try to take the subject in an exam in the 2nd season.
Title: ISO/IEC 27037:2012. Information technology ? Security techniques ? Guidelines for identification, collection, acquisition and preservation of digital evidence
Carrier B. (2005). File system forensic analysis. Addison-Wesley Professional. ISBN 0321268172.
Johansen G. (2020). Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats. Packt Publishing Ltd. ISBN: 978-1838649005.
Oettinger W. (2020). Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence. Packt Publishing Ltd. ISBN: 978-1838648176.
Casey E. (2009). Handbook of digital forensics and investigation. Academic Press. ISBN: 0123742676.
Sammons J. (2012). The basics of digital forensics: the primer for getting started in digital forensics. Syngress. ISBN: 978-0128016350
Authors:
Reference:
Year:
Title: Conjunto de materiais distribuídos pela equipa docente no decurso das aulas.
Authors:
Reference:
Year:
Applied Cryptography
At the end of this UC the student should be able to:
LO1: Understand the main basic principles of modern cryptography
LO2: Understand how the main cryptographic cipher mechanisms work
LO3: Understand how some of the main cryptographic protocols work
LO4: Understand the future development of cryptography
LO5: Realise the use of cryptographic mechanisms to protect computers, networks and data.
SC1. Introduction to cryptosystems and cryptanalysis
SC2. Continuous Ciphers
SC3. Block Ciphers
SC4. Message Abstraction and Integrity Functions
SC5. Public-key cryptography
SC6. Digital Signatures
SC7. Identification Protocols, Authenticated Key Exchange and Null Knowledge Protocols
SC8. Lattice-based cryptography and fully homomorphic cryptography
SC9. Cryptographic Tools and Libraries
Periodic Assessment:
- Components:
* 50% - Project;
* 50% - Individual written test (without consultation).
- Minimum score for both components: 40%.
Review for final exam:
* 100% - Written test
- Final approval: note >= 10
Title: Stinson D. R., Paterson M. (2018). Cryptography: Theory and Practice. Chapman and Hall/CRC. ISBN: 978-1138197015.
Aumasson J. (2017). Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press. ISBN: 978-1593278267.
Tilborg H., Jajodia S. (2011). Encyclopedia of Cryptography and Security. Springer. ISBN: 978-1441959058.
Paar C., Pelzl J., Preneel B. (2014). Understanding Cryptography: A Textbook for Students and Practitioners. Springer. ISBN: 978-3642446498.
Bray S. (2020). Implementing Cryptography Using Python. Wiley. ISBN: 978-1119612209.
Nielson S. J., Monson C. (2019). Practical Cryptography in Python: Learning Correct Cryptography by Example. ISBN: 978-1484248997
Authors:
Reference:
Year:
Title: Material complementar a fornecer pela equipa docente durante as aulas.
Ristic I. (2013). OpenSSL Cookbook: A Guide to the Most Frequently Used OpenSSL Features and Commands. Feisty Duck. ISBN: 9781907117053.
Schneier B. (2017). Applied Cryptography: Protocols, Algorithms and Source Code in C. Wiley. ISBN: 978-1119096726.
Bowne S. (2018). Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data. Packt Publishing. ISBN: 978-1789534443.
Zúquete A. (2018). Segurança em Redes Informáticas. FCA. ISBN: 978-972-722-857-7.
Authors:
Reference:
Year:
Entrepreneurship and Innovation II
At the end of this UC, the student should be able to:
LG.1. Present the image of the product/service in a website
OA.2. Present the image of the product/service in social networks
OA.3. Describe functionalities of the product/service
OA.4. Describe phases of the development plan
OA.5. Develop a prototype
OA.6. Test the prototype in laboratory
OA.7. Correct the product/service according to tests
OA.8. Optimize the product/service considering economic, social, and environmental aspects
OA.9. Adjust the business plan after development and tests, including commercialization and image
OA.10. Define product/service management and maintenance plan
I. Development of the product/service image
II. Functionalities of the product/service
III. Development plan
IV. Development of the product/service (web/mobile or other)
V. Revision of the business plan
VI. Management and maintenance of the product/service
VII. Certification plan
VIII. Intellectual property, patents, and support documentation
IX. Main aspects for the creation of a startup - juridical, account, registry, contracts, social capital, obligations, taxes
Periodic grading system:
- Group project: first presentation: 30%; second presentation: 30%; final report: 40%. The presentations, demonstrations and Defence are in group.
Title: ·
A. Osterwalder, Y. Pigneur / John Wiley & Sons, Value Proposition Design: How to Create Products and Services Customers Want, 2014, ·, ·
A. Osterwalder, Y. Pigneur / John Wiley & Sons, Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers, 2010, ·, ·
P. Burns / Palgrave Macmillan, Entrepreneurship and Small Business, 2016, ·, ·
R. Dorf, T. Byers, A. Nelson / McGraw-Hill Education, Technology Ventures: From Idea to Enterprise., 2014, ·, ·
S. Mariotti, C. Glackin / Global Edition. Pearson, Entrepreneurship: Starting and Operating A Small Business, 2015, ·, ·
Authors:
Reference:
Year:
Internet Programming
LO1 Frame and understand the main components of the World Wide Web;
LO2 Know and correctly apply the client programming model and the MVC paradigm;
LO3 Use and extend server technologies to develop web applications and services;
LO4 Integrate web applications and services with Database Management Systems;
LO5 Understand the life cycle pipeline of a web project;
LO6 Develop creativity, technological innovation, critical thinking;
LO7 Develop self-learning, peer review, teamwork, oral expression.
S1 Introduction. The history of the Web. Programming languages for the Web; W3C standards.
S2 World Wide Web Architecture. Screen marking with HyperText Markup Language (HTML).
S3 Client-side programming. Structure description (HTML), style sheets (CSS) and dynamic updating of the graphical interface. Input validation; Introduction to client-side security.
S4 Server-side programming. Distribution of static content, dynamic generation of content and MVC design pattern. Services and communication between services. Introduction to server-side security.
S5 Data persistence. Integration with Database Management Systems
S6 Service-oriented web architectures. Web Services and Microservices. Middleware models for the Web. Containerization.
Course with Periodic Assessment, not by Final Exam.
Assessment weights:
- Lab project (in group between 2 and 4), with technical report, individual oral discussion (60%)
- 4 multiple response individual Mini-tests (40%)
A mark below 8 assigns (in average of mini-tests) the student to an exam in normal and/or the appeal period (40% of the mark) in a written test, with the completion and approval of the group project, or an individual project (with technical report and individual oral discussion) is mandatory (60%).
Title: Livros de texto:
Dean J. (2018). Web Programming with HTML5, CSS, and JavaScript. Ed: Jones & Bartlett Learning. ISBN-13: 978-1284091793. ISBN-10: 1284091791
Menezes N. (2019). Introdução à programação com Python: Novatec. ISBN-13: 978-8575227183.
Grinberg M. (2018). Flask Web Development: Developing Web Applications with Python. O'Reilly. ISBN: 978-1491991732
George N. (2019). Build a Website With Django 3: A complete introduction to Django 3. GNW Independent Publishing. ISBN: 978-0994616890.
Ahmad H. (2017). Building RESTful Web Services with PHP 7. Ed: Packt Publishing. ISBN-13: 9781787127746.
Hillar G. (2016). Building RESTful Python Web Services. Packt Publishing. ISBN: 978-1786462251
Haverbeke M. (2018). Eloquent JavaScript: A Modern Introduction to Programming (3rd. ed.). No Starch Press, USA.
Architecture of the World Wide Web, Volume One, W3C Recommendation 15 December 2004, https://www.w3.org/TR/webarch/
Authors:
Reference:
Year:
Title: Haverbeke M. (2018). Eloquent JavaScript: A Modern Introduction to Programming (3rd. ed.). No Starch Press, USA.
Architecture of the World Wide Web, Volume One, W3C Recommendation 15 December 2004, https://www.w3.org/TR/webarch/
Artigos:
Fielding, R. T. (2000) REST: Architectural Styles and the Design of Network-based Software Architectures, PhD thesis, University of California, Irvine.
Authors:
Reference:
Year:
Distributed Systems and Security
At the end of this course, the student should be able to
LO1. To introduce and to give to the students the main systems distributed through the Internet
LO2. Provide students with knowledge about a set of distributed architectures and services as well as their implementation: web applications and services, messaging services, mobile applications, IoT, Cloud and Distributed Ledger Technologies
LO3. Understand the main security threats and challenges of the same and possible mitigations.
SC1. Introduction to Distributed Systems: fundamentals and main paradigms
SC2. Distributed Computing Models and Platforms
SC3. Fundamentals of Fault-tolerant Systems: Main Paradigms, Models and Platforms of Trusted Systems
SC4. Real-Time Distributed Systems: Main Models and Platforms
SC5. Main Threats, Vulnerabilities and Security Attacks on Distributed Systems
SC6. Security Models and Measures in Distributed Systems
Periodic Assessment:
- 2 tests (50%)
- 3 laboratory activities (15%)
- 1 practical group project (35%)
The minimum mark for each test is 8 values. Such fact, implies that students must have a positive mark in the group work as well as in the laboratory activities (i.e. higher than 11 values).
Assessment by Exam:
-Students who fail the periodic assessment may try to take the subject through an exam.
Regardless of the form of assessment the student takes, the minimum mark for approval is 10 values.
Title: -Steen M., Tanenbaum A. (2017). Distributed Systems. CreateSpace Independent Publishing Platform. ISBN: 978-1543057386.
-Vitillo R. (2021). Understanding Distributed Systems: What every developer should know about large distributed applications. Roberto Vitillo. ISBN: 978-1838430207.
-Oprea, A. et al. (2020) Building secure and reliable systems: Best practices for designing, implementing, and maintaining systems. Sebastopol, CA: O’Reilly Media. ISBN: 978-1492083122.
-Anderson, R. (2021) Security engineering: A guide to building dependable distributed systems. New York: Wiley. ISBN: 978-1119642787.
Authors:
Reference:
Year:
Title: -Pierfederici, F. (2016) Distributed computing with python: Harness the power of multiple computers using python through this fast-paced informative guide. Birmingham, UK: Packt Publishing Limited.
-Kathiravelu, P. and Faruque, S.M.O. (2017) Python Network Programming Cookbook: Overcome Real-world networking challenges. Birmingham, U.K.: Packt Publishing.
Authors:
Reference:
Year:
Digital Systems and Networks Security Auditing
Upon completion of this course students will be able to:
LO1. Understand and identify the main security risks and threats that systems and networks are exposed
LO2. To know the main methodologies and procedures for security audits
LO3. Identify and know some of the main security audit tools
LO4. Know and correctly apply the life cycle of carrying out security audits
LO5. Apply ethical principles in the conduct of security audits
SC1. Introduction to auditing and computer security assessments
SC2. Main standards and procedures for certification and security auditing
SC3. Methodologies for audits and assessments of computer security
SC4. Security audit tools for systems, communication networks and information
SC5. Definition, implementation and management of audit projects for security systems, communication networks and information
SC6. Conducting security audits of systems, communication networks and information: gathering information, conducting audit, validation and confirmation of results, identification and confirmation of vulnerabilities or non-conformities
SC7. Preparing reports with the results of audits and computer security assessments: auditing and assessment process, activities, evidences and reports (remediation/mitigation) of vulnerabilities
SC8. Principles of ethics and deontology in conducting computer security audits.
Periodic Assessment:
- Components:
* 40% - Project;
* 60% - Individual written test (without consultation).
- Minimum score for both components: 40%.
Review for final exam:
* 100% - Written test
- Final approval: note >= 10
Title: Hutchens J. (2014). Kali Linux Network Scanning Cookbook. Packt Publishing Ltd.
Velu V. K. (2017). Mastering Kali Linux for Advanced Penetration Testing.Packt Publishing Ltd. ISBN: 9781787120235
Baloch R. (2014). Ethical Hacking and Penetration Testing Guide. Auerbach Publications. ISBN: 978-1482231618
Vladimirov A. (2016). Assessing Information Security - Strategies, Tactics, Logic and Framework. IT Governance Publishing.
Authors:
Reference:
Year:
Title: Parasram S. , Samm A., Boodoo D. (2018). Kali Linux 2018: Assuring Security by Penetration Testing. Packt Publishing Ltd. ISBN: 9781789341768
Sak B, Ram J. R. (2016). Mastering Kali Linux Wireless Pentesting. Packt Publishing Ltd. ISBN: 9781785285561
Patel R. S. (2013). Kali Linux social engineering. Packt Publishing Ltd. ISBN: 9781783283279
Conjunto de materiais distribuídos pela equipa docente no decurso das aulas.
Authors:
Reference:
Year:
Software and Application Security
Upon completion of this course students will be able to:
LO1. Know and to understand the problems of software and application security
LO2. To know and to understand the main risks and challenges of Web and Mobile application security
LO3. Know and apply methodologies and principles for secure software design and development
LO4. Know techniques to perform software and application exploitation
LO5. Design mitigation measures in software and applications to avoid security vulnerabilities
SC1. Security problems in applications and software: memory exploitation, concurrence conditions, output generation, side channels, among others.
SC2. Detection of software vulnerabilities and mitigation of their exploitation
SC3. Secure software development for the mitigation of vulnerabilities
SC4. Software Development, Security and Operation (DevSecOps)
SC5. Main vulnerabilities exploited in web applications, mobile, web services and APIs
SC6. Cybersecurity and data protection controls that should be implemented in web applications, mobile, web services and APIs
SC7. Exploitation of vulnerabilities in web applications, mobile and web services
Periodic Assessment:
- Components:
* 40% - Project;
* 60% - Individual written test (without consultation).
- Minimum score for both components: 40%.
Review for final exam:
* 100% - Written test
- Final approval: note >= 10
Title: Zalewski M. (2012). The tangled web: A guide to securing modern web applications. No Starch Press. ISBN: 1-59327-388-6.
Stuttard D., Pinto M. (2012). The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws. Wiley. ISBN: 978-1118026472.
Hsu, T. H. C. (2018). Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps. Packt Publishing Ltd. ISBN : 1788995503.
Richardson T. (2012). Secure Software Design. Jones & Bartlett Learning. ISBN: 978-1449626327
Deogun D., Johnsson B., Sawano D. (2019). Secure By Design. Manning Publications. ISBN: 978-1617294358
Grembi J. (2008). Secure Software Development: A Security Programmer's Guide. Cengage Learning. ISBN: 978-1418065478
Adkins H., Beyer B., Blankinship P., Lewandowski P., Oprea A., & Stubblefield A. (2020). Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems. O'Reilly Media. ISBN: 978-1492083122.
Authors:
Reference:
Year:
Title: Conjunto de materiais distribuídos pela equipa docente no decurso das aulas.
Authors:
Reference:
Year:
Security Operations and Incident Management
Upon completion of this course, students should:
LO1. Identify the main sources, systems and mechanisms for data acquisition and security events
LO2. Identify and apply the main techniques, methods and tools needed for incident response
LO3. Identify suspicious behaviours and events and discern malicious activities
LO4. Apply methods to contain, eradicate and respond to cyber security threats
LO5. Define and implement disaster recovery plans
LO6. Apply methods for business continuity management
SC1. Requirements Analysis and Support for Security Investigations
SC2. CERT, CSIRT and SOC: objectives, functioning and operation
SC3. Logging and security monitoring activities: sources, systems, data acquisition and analysis
SC4. Resource protection techniques
SC5. Incident management and prevention
SC6. Management of vulnerabilities and security patches
SC7. Incident Recovery Strategies
SC8. Disaster Recovery Plans and Processes
SC9. Business Continuity Planning
Periodic Assessment:
- Individual test (60%)
- Resolution of a group project (40%)
Students who fail the periodic assessment may try to take the subject in an exam in the 2nd season.
Title: Snedaker S. (2013). Business Continuity and Disaster Recovery Planning for IT Professionals. Syngress. ISBN: 978-0124105263
Whitman M., Mattord H. (2013). Principles of Incident Response & Disaster Recovery. Cengage Learning. ISBN: 978-1111138059
Anson S. (2020). Applied Incident Response. Wiley. ISBN: 978-1119560265
Chuvakin A., Schmidt K., Phillips C. (2012). Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management. Syngress. ISBN: 978-1597496353
Authors:
Reference:
Year:
Title: Cichonski P., Millar T., Grance T., Scarfone K. (2012). Computer Security Incident Handling Guide (SP 800-61 Rev. 2). National Institute of Standards and Technology.
Phillips B., Landahl M. (2020). Business Continuity Planning: Increasing Workplace Resilience to Disasters. Butterworth-Heinemann. ISBN: 978-0128138441
Murdoch D. (2019). Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat Hunter. Independently published. ISBN: 978-1091493896
Authors:
Reference:
Year:
Technology, Economy and Society
The student who successfully completes this UC will be able to:
OA1. Identify the main contemporary issues and debates;
OA2. Analyze current issues and debates in a reasoned manner;
OA3. Identify the implications of technological change and digitalization in economic, social, cultural and environmental terms;
OA4. Understand the role and the importance of technology in the challenges of contemporary societies;
OA5. Explore the boundaries between technological knowledge and social science knowledge;
OA6. Develop forms of interdisciplinary learning and critical thinking.
S1. Debates XXI: technological change and contemporary societal challenges.
S2. Digital transition: meaning and implications.
S3. Technology, social change and inequalities.
S4. Environment and transition towards to sustainability.
S5. Globalization, financialisation and development.
S6. Capitalism and democracy.
S7. Migrations and multiculturality.
The periodic assessment process comprises the following elements:
1. Preparation and presentation (class) of a group work on technological change and society (40%).
2. Test (60%).
The final assessment corresponds to 1st and 2nd phase exams (100% of the grade).
Title: Pires, R. P.; Pereira, C.; Azevedo, J.; Vidigal, I., & Veiga, C. M. (2020). A emigração portuguesa no século XXI.?Sociologia, Problemas e Práticas, (94), 9-38
Marques, P., & Salavisa, I. (2017). Young people and dualization in Europe: a fuzzy set analysis.?Socio-Economic Review,?15(1), 135-160
Figay, N.; Silva, C.; Ghodous, P; Jardim-Gonçalves, R. (2015). Resolving interoperability in concurrent engineering, in Concurrent Engineering in the 21st Century: Foundations, Developments and Challenges, Springer International Publishing
Bento, N., Wilson, C., Anadon, L.D. (2018), ?Time to get ready: Conceptualizing the temporal and spatial dynamics of formative phases for energy technologies,? Energy Policy 119: 282-293
Barradas, R., & Lagoa, S. (2017). Financialization and Portuguese real investment: A supportive or disruptive relationship?.?Journal of Post Keynesian Economics,?40(3), 413-439
Authors:
Reference:
Year:
Title: Yearley, S. (2014).?Science, Technology, and Social Change (Routledge Revivals). Routledge
Wilson, C., Grubler, A., Bento, N., Healey, S., De Stercke, S., & Zimm, C. (2020). Granular technologies to accelerate decarbonization.?Science,?368(6486), 36-39
Silva, P. A., & Cadeiras, P. (2019). From Paris to Lisbon: The Ever-Changing European Social Policy Landscape. In?The Future of Pension Plans in the EU Internal Market?(pp. 255-281). Springer, Cham
Silva, J., Ferreira, J. C., & Gonçalves, F. (2019, September). The ??aftermath??of Industry 4.0 in Small and Medium Enterprises. In?IFIP Conference on Human-Computer Interaction?(pp. 26-33). Springer, Cham
Rodrigues, M. D. L., & Silva, P. A. (2016). A constituição e as políticas públicas em Portugal.?Sociologia, Problemas e Práticas, (ESP1), 13-22
Rego, R., Alves, P. M., Naumann, R., & Silva, J. (2014). A typology of trade union websites with evidence from Portugal and Britain.?European Journal of Industrial Relations,?20(2), 185-195
Ratto, M. (2011). Critical making: Conceptual and material studies in technology and social life.?The information society,?27(4), 252-260
Pires, R. P., Machado, F. L., Peixoto, J., & Vaz, M. J. (2010). Portugal: Atlas das migrações internacionais.?Lisboa: Tinta da China
Pedro, M. D. L. R. E., & Silva, A. E. (2012).?Políticas públicas em Portugal. Leya
Nascimento, S., Pólvora, A., Paio, A., Oliveira, S., Rato, V., Oliveira, M. J., ... & Sousa, J. P. (2016). Sustainable technologies and transdisciplinary futures: from collaborative design to digital fabrication.?Science as Culture,?25(4), 520-537
Monteiro, V., Afonso, J. A., Ferreira, J. C., & Afonso, J. L. (2019). Vehicle electrification: New challenges and opportunities for smart grids.?Energies,?12(1), 118.
Matthewman, S. (2011).?Technology and social theory. Macmillan International Higher Education
Matos, F. (2020).?Knowledge, People, and Digital Transformation: Approaches for a Sustainable Future. Springer Nature
Luís, S., Pinho, L., Lima, M. L., Roseta-Palma, C., Martins, F. C., & Betâmio de Almeida, A. (2016). Is it all about awareness? The normalization of coastal risk.?Journal of Risk Research,?19(6), 810-826
Leach, M., Scoones, I., & Stirling, A. (2010).?Dynamic sustainabilities: technology, environment, social justice. Routledge
Lagoa, S., Leao, E., Mamede, R. P., & Barradas, R. (2014).?Financialisation and the financial and economic crises: The case of Portugal?(No. fstudy24). Financialisation, Economy, Society & Sustainable Development (FESSUD) Project
Grubler, A., Wilson, C., Bento, N., Boza-Kiss, B., Krey, V., McCollum, D. L., ... & Valin, H. (2018). A low energy demand scenario for meeting the 1.5 C target and sustainable development goals without negative emission technologies.?Nature energy,?3(6), 515-527
Jörgens, H., & Solorio, I. (2019). Contested Energy Transition? Europeanization and Authority Turns in EU Renewable Energy Policy
Jörgens, H. (2018). Políticas para um desenvolvimento sustentável: sucessos passados e desafios para o futuro
Jörgens, H., Goritz, A., & Kolleck, N. (2018). Vantagens e desafios da análise de dados do Twitter: O caso das negociações multilaterais sobre as mudanças climáticas
Horta, P., Lagoa, S., & Martins, L. (2016). Unveiling investor-induced channels of financial contagion in the 2008 financial crisis using copulas.?Quantitative Finance,?16(4), 625-637
Frois, C. (2013).?Peripheral vision: Politics, technology, and surveillance?(Vol. 22). Berghahn Books
Facer, K. (2011).?Learning futures: Education, technology and social change. Taylor & Francis
Berbel, J., Borrego-Marin, M., Exposito, A., Giannoccaro, G., Montilla-Lopez, N. M., & Roseta-Palma, C. (2019). Analysis of irrigation water tariffs and taxes in Europe.?Water Policy,?21(4), 806-825
Bento, N. (2010). Dynamic competition between plug-in hybrid and hydrogen fuel cell vehicles for personal transportation.?International journal of hydrogen energy,?35(20), 11271-11283
Bento, N., & Fontes, M. (2015). Spatial diffusion and the formation of a technological innovation system in the receiving country: The case of wind energy in Portugal.?Environmental Innovation and Societal Transitions,?15, 158-179
Bento, N. (2016). Calling for change? Innovation, diffusion, and the energy impacts of global mobile telephony.?Energy Research & Social Science,?21, 84-100.
Bento, N., & Fontes, M. (2019). Emergence of floating offshore wind energy: Technology and industry.?Renewable and Sustainable Energy Reviews,?99, 66-82
Bento, N., Gianfrate, G., & Thoni, M. H. (2019). Crowdfunding for sustainability ventures.?Journal of Cleaner Production,?237, 117751
Barak, M. (2017). Science teacher education in the twenty-first century: A pedagogical framework for technology-integrated social constructivism.?Research in Science Education,?47(2), 283-303.
Authors:
Reference:
Year:
Accreditations