CYBERSECURITY FOR HEALTHCARE

International Teaching CYBERSECURITY FOR HEALTHCARE

Back

IE23200005
DEPARTMENT OF INFORMATION AND ELECTRICAL ENGINEERING AND APPLIED MATHEMATICS
EQF7
INFORMATION ENGINEERING FOR DIGITAL MEDICINE
2025/2026

OBBLIGATORIO
YEAR OF COURSE 1
YEAR OF DIDACTIC SYSTEM 2025
SPRING SEMESTER
CFUHOURSACTIVITY
432LESSONS
432LAB
18EXERCISES
Objectives
The course provides the skills needed for designing and implementing secure IT infrastructures and systems that comply with standards in the domain of healthcare system security, also through the use of advanced technologies and methodologies.

Knowledge and Understanding
Reference standards in the field of cybersecurity for healthcare information systems. Architectural solutions, algorithms, methods, and techniques for authentication, authorization, and data protection. Main methods and techniques for designing and implementing secure network infrastructures using firewalls, proxies, and IDS. Techniques and tools for monitoring healthcare services and systems with respect to security requirements. Methodologies for designing high-reliability systems through the use of redundancy and diversity in healthcare systems. Methodologies and techniques for designing secure cloud-based healthcare systems, and verification of security requirements through auditing and penetration testing processes.

Applied Knowledge and Understanding
Design, implement, and validate healthcare systems that meet the requirements set by current standards. Design and implement a public key infrastructure for certificate management; configure systems for managing access control policies. Design, configure, and manage demilitarized zones (DMZs) and IDS systems. Implement and manage workflow processes for monitoring resources and users in distributed healthcare systems, including cloud-based environments. Design high-reliability systems through the use of redundancy and diversity in healthcare applications. Implement audit processes using analysis, monitoring, and penetration testing techniques.
Prerequisites
CONTENTS OF THE COURSES OF OPERATING SYSTEMS, SOFTWARE ENGINEERING, COMPUTER NETWORKS
Contents
DIDACTIC UNIT 1: BASICS ON CYBERSECURITY OF HEALTHCARE SYSTEMS
(LECTURE/PRACTICE/LABORATORY HOURS 6/0/0)
- 1 (3 HOURS LECTURE): INTRODUCTION TO HEALTHCARE INFORMATION SYSTEMS; TREATS AND ATTACKS
- 2 (3 HOURS LECTURE): STANDARDS AND COMMON REQUIREMENTS FOR HEALTHCARE INFORMATION SYSTEMS: ISO 270001, 27799, HIPAA, NIST SP 800-53
KNOWLEDGE AND UNDERSTANDING: UNDERSTANDING OF THE REFERENCE STANDARDS IN THE FIELD OF CYBERSECURITY FOR HEALTHCARE INFORMATION SYSTEMS
KNOWLEDGE AND UNDERSTANDING APPLIED: ABILITY TO DESIGN, IMPLEMENT AND VALIDATE HEALTHCARE SYSTEMS THAT MEET THE REQUIREMENTS OF CURRENT STANDARDS

DIDACTIC UNIT 2: AUTHENTICATION, AUTHORIZATION AND ENCRYPTION
(LECTURE/PRACTICE/LABORATORY HOURS 9/0/9)
- 3 (3 HOURS LECTURE): CRYPTOGRAPHY, KEYS, HASHING FUNCTIONS
- 4 (3 HOURS LECTURE): PKI, CERTIFICATES AND KEY MANAGEMENT
- 5 (3 HOURS LECTURE): COMMONLY USED AUTHENTICATION AND AUTHORIZATION SYSTEMS (KERBEROS, RADIUS, LDAP, PAM)
- 6 (3 HOURS LABORATORY): CRYPTOGRAPHY, OPENSSSL
- 7 (3 HOURS LABORATORY): X509 AND KEY MANAGEMENT WITH KERBEROS
- 8 (3 HOURS LABORATORY): RADIUS, LDAP/PAM
KNOWLEDGE AND UNDERSTANDING: UNDERSTANDING OF ALGORITHMS, METHODS AND TECHNIQUES FOR AUTHENTICATION, AUTHORIZATION, CREATION OF PUBLIC KEY INFRASTRUCTURES FOR MANAGING CERTIFICATES
KNOWLEDGE AND UNDERSTANDING APPLIED: ABILITY TO CREATE A PUBLIC KEY INFRASTRUCTURE FOR CERTIFICATE MANAGEMENT, AND TO CONFIGURE SYSTEMS FOR MANAGING RESOURCE ACCESS POLICIES

DIDACTIC UNIT 3: NETWORK AND PERIMETER SECURITY, MONITORING AND LOGGING
(LECTURE/PRACTICE/LABORATORY HOURS 6/0/9)
- 9 (3 HOURS LECTURE): FIREWALLS AND PROXIES, NAT, VPN AND DMZ
- 10 (3 HOURS LABORATORY): FIREWALLS WITH IPTABLES
- 11 (3 HOURS LABORATORY): CONFIGURING A PROXY WITH SQUID
- 12 (3 HOURS LECTURE): INTRUSION DETECTION SYSTEMS AND INTRUSION PROTECTION SYSTEMS; MALWARE AND VIRUS DETECTION
- 13 (3 HOURS LABORATORY): CONFIGURING AND RUNNING SNORT AS IDS
KNOWLEDGE AND UNDERSTANDING: UNDERSTANDING OF THE MAIN METHODS AND TECHNIQUES FOR THE CREATION OF SECURE NETWORK PERIMETERS, THROUGH THE USE OF FIREWALL PROXIES AND IDS
KNOWLEDGE AND UNDERSTANDING APPLIED: ABILITY TO DESIGN, CONFIGURE AND MANAGE DEMILITARIZED ZONES (DMZ) AND IDS SYSTEMS

DIDACTIC UNIT 4: SYSTEM MONITORING AND LOGGING
(LECTURE/PRACTICE/LABORATORY HOURS 3/0/3)
- 14 (3 HOURS LECTURE): BASICS ON ANALYSIS OF SYSTEMS AND SYSTEMS CONFIGURATION
- 15 (3 HOURS LABORATORY): DETERMINING CURRENT STATUS OF A COMPUTING SYSTEM (USERS, ACTIVITIES, FILES, NETWORK TRAFFIC)
KNOWLEDGE AND UNDERSTANDING: UNDERSTANDING OF THE TECHNIQUES AND TOOLS FOR MONITORING HEALTHCARE SYSTEMS WITH RESPECT TO SAFETY REQUIREMENTS
KNOWLEDGE AND UNDERSTANDING APPLIED: ABILITY TO IMPLEMENT AND MANAGE WORKFLOW PROCESSES FOR MONITORING RESOURCES AND USERS IN DISTRIBUTED HEALTHCARE SYSTEMS

DIDACTIC UNIT 5: DISASTER RECOVERY AND CONTINUITY PLANNING
(LECTURE/PRACTICE/LABORATORY HOURS 3/0/0)
- 16 (3 HOURS LECTURE): DETECTION, MITIGATION AND RECOVERY; COMMON WORKFLOW IN HEALTHCARE INFORMATION SYSTEMS
KNOWLEDGE AND UNDERSTANDING: UNDERSTANDING OF THE METHODOLOGIES AND TECHNIQUES APPLIED FOR DISASTER RECOVERY AND FOR THE CONSTRUCTION OF HIGHLY RELIABLE SYSTEMS
KNOWLEDGE AND UNDERSTANDING APPLIED: ABILITY TO DESIGN HIGHLY RELIABLE SYSTEMS THROUGH THE USE OF REDUNDANCY AND DIVERSITY IN HEALTHCARE SYSTEMS

DIDACTIC UNIT 6: DESIGN AND VERIFY ISO COMPLIANT HEALTHCARE SYSTEMS
(LECTURE/PRACTICE/LABORATORY HOURS 9/0/9)
- 17 (3 HOURS LECTURE): DESIGN METHODOLOGIES (SYSTEMS AND PROCESSES) AND COMMON ACTIVITIES, VALIDATION AND VERIFICATION
- 18 (3 HOURS LABORATORY): DESIGN AND VERIFICATION OF A SECURE HEALTHCARE SYSTEM
- 19 (3 HOURS LABORATORY): DESIGN AND VERIFICATION OF A SECURE HEALTHCARE SYSTEM
- 20 (3 HOURS LECTURE): SECURITY AUDIT PROCESSES
KNOWLEDGE AND UNDERSTANDING: UNDERSTANDING OF METHODOLOGIES AND TECHNIQUES FOR THE DESIGN OF DISTRIBUTED HEALTHCARE SYSTEMS, AND VERIFICATION OF REQUIREMENTS THROUGH AUDIT PROCESSES
KNOWLEDGE AND UNDERSTANDING APPLIED: ABILITY TO IMPLEMENT AUDIT PROCESSES THROUGH ANALYSIS, MONITORING AND PEN TESTING TECHNIQUES

DIDACTIC UNIT 7: WORK PROJECT
(LECTURE/PRACTICE/LABORATORY HOURS 0/0/12)
- 21 (3 HOURS LABORATORY): SECURITY AUDIT DESIGN AND DEFINITION ON A CASE STUDY
- 22 (3 HOURS LABORATORY): PEN TESTING
- 23 (3 HOURS LABORATORY): PEN TESTING
- 24 (3 HOURS LABORATORY): PEN TESTING
KNOWLEDGE AND UNDERSTANDING APPLIED: ABILITY TO APPLY THE METHODS, TECHNIQUES AND TOOLS ACQUIRED DURING THE COURSE ON A REAL CASE STUDY


TOTAL LECTURE/PRACTICE/LABORATORY HOURS 32/0/40










Teaching Methods
LESSONS AND EXERCISES IN THE CLASSROOM. THE TOPICS ARE PRESENTED IN THE FRONTAL LESSONS BY INTRODUCING NEW PROBLEMS OR PROBLEMS OF GROWING COMPLEXITY. IN THE EXERCISES A TASK IS PROPOSED TO BE COMPLETED USING THE TECHNIQUES PRESENTED IN THE FRONTAL LESSONS.
Verification of learning
VERIFICATION BASED ON A WORKPROJECT WHICH PROVIDES FOR THE DESIGN AND IMPLEMENTATION OF A SECURE INFORMATION SYSTEM IN THE HEALTHCARE SECTOR, WITH RISK ANALYSIS, DEFINITION OF AN AUDITING AND PENTESTING PROCESS FOR SYSTEM VALIDATION

THE CORRECTNESS, COMPLETENESS AND LEVEL OF DETAIL OF THE PROJECT WITH RESPECT TO THE SPECIFIC PROPOSALS WILL BE EVALUATED

THE VERIFICATION INCLUDES AN INDIVIDUAL ORAL PART WHERE THE STUDENTS WILL HAVE TO DEFEND THE CHOICES MADE AT THE DESIGN LEVEL AND WILL HAVE TO ILLUSTRATE THE PROPOSED IMPLEMENTATION PART
Texts
WILLIAM STALLINGS, CRYPTOGRAPHY AND NETWORK SECURITY
• MIKE O LEARY CYBER OPERATIONS BUILDING, DEFENDING, AND
ATTACKING MODERN COMPUTER NETWORKS
• BROOKS, GROW, CRAIG, SHORT. CYBERSECURITY ESSENTIALS
• L. AYALA. CYBERSECURITY FOR HOSPITALS AND HEALTHCARE FACILITIES:
A GUIDE TO DETECTION AND PREVENTION - APRESS
• KALI LINUX PENTESTING GUIDE
More Information
The course is held in English
  BETA VERSION Data source ESSE3