Unit INTRODUCTION TO COMPUTER SECURITY
- Course
- Informatics
- Study-unit Code
- A000702
- Curriculum
- In all curricula
- Teacher
- Stefano Bistarelli
- Teachers
-
- Stefano Bistarelli
- Hours
- 42 ore - Stefano Bistarelli
- CFU
- 6
- Course Regulation
- Coorte 2021
- Offered
- 2023/24
- Learning activities
- Caratterizzante
- Area
- Discipline informatiche
- Academic discipline
- INF/01
- Type of study-unit
- Opzionale (Optional)
- Type of learning activities
- Attività formativa monodisciplinare
- Language of instruction
- Italian
- Contents
- 1 Introduction
PART ONE: CRYPTOGRAPHY
2 Symmetric Encryption and Message Confidentiality
3 Public-Key Cryptography and Message Authentication
PART TWO: NETWORK SECURITY APPLICATIONS
4 Key Distribution and User Authentication
5 Network Access Control and Cloud Security
6 Transport-Level Security
7 Wireless Network Security
8 Electronic Mail Security
9 IP Security
PART THREE: SYSTEM SECURITY
10 Malicious Software
11 Intruders
12 Firewalls - Reference texts
- Network Security Essentials: Applications and Standards, Global Edition
By: William Stallings
Publisher: Pearson (Intl)
Print ISBN: 9781292154855, 1292154853
eText ISBN: 9781292154916, 1292154918
Edition: 6th
Copyright year: 2017 - Educational objectives
- To understand the meaning of Information Security and of the Confidentiality, Integrity and Availability attributes.
Understand the problem of connectinf secure systems over unsecure networks.
Understand the basic notions of Information Security, Computer Security and Network Security. - Prerequisites
- none
- Teaching methods
- Face-to-face and laboratory. possibility of seminars by different guests
- Other information
- Frequency of the lessons is strongly suggested
- Learning verification modality
- Oral interview lasting an average of 30 minutes on topics of covering all the program of the course. Possibility of specific projects or seminars.
At the request of the student examination can 'be done in Italian or English. - Extended program
- 1 Introduction
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 Fundamental Security Design Principles
1.7 Attack Surfaces and Attack Trees
1.8 A Model for Network Security
1.9 Standards
PART ONE: CRYPTOGRAPHY
2 Symmetric Encryption and Message Confidentiality
2.1 Symmetric Encryption Principles
2.2 Symmetric Block Encryption Algorithms
2.3 Random and Pseudorandom Numbers
2.4 Stream Ciphers and RC4
2.5 Cipher Block Modes of Operation
3 Public-Key Cryptography and Message Authentication
3.1 Approaches to Message Authentication
3.2 Secure Hash Functions
3.3 Message Authentication Codes
3.4 Public-Key Cryptography Principles
3.5 Public-Key Cryptography Algorithms
3.6 Digital Signatures
PART TWO: NETWORK SECURITY APPLICATIONS
4 Key Distribution and User Authentication
4.1 Remote User Authentication Principles
4.2 Symmetric Key Distribution Using
Symmetric Encryption
4.3 Kerberos
4.4 Key Distribution Using Asymmetric Encryption
4.5 X.509 Certificates
4.6 Public-Key Infrastructure
4.7 Federated Identity Management
5 Network Access Control and Cloud Security
5.1 Network Access Control
5.2 Extensible Authentication Protocol
5.3 IEEE 802.1X Port-Based Network Access Control
5.4 Cloud Computing
5.5 Cloud Security Risks and Countermeasures
5.6 Data Protection in the Cloud
5.7 Cloud Security as a Service
5.8 Addressing Cloud Computing Security Concerns
6 Transport-Level Security
6.1Web Security Considerations
6.2 Transport Layer Security
6.3 HTTPS
6.4 Secure Shell (SSH)
7 Wireless Network Security
7.1 Wireless Security
7.2 Mobile Device Security
7.3 IEEE 802.11 Wireless LAN Overview
7.4 IEEE 802.11i Wireless LAN Security
8 Electronic Mail Security
8.1 Internet Mail Architecture
8.2 E-mail Formats
8.3 E-mail Threats and Comprehensive E-mail Security
8.4 S/MIME
8.5 Pretty Good Privacy
8.6 DNSSEC
8.7 DNS-Based Authentication of Named Entities
8.8 Sender Policy Framework
8.9 DomainKeys Identified Mail
8.10 Domain-Based Message Authentication, Reporting, and Conformance
9 IP Security
9.1 IP Security Overview
9.2 IP Security Policy
9.3 Encapsulating Security Payload
9.4 Combining Security Associations
9.5 Internet Key Exchange
9.6 Cryptographic Suites
PART THREE: SYSTEM SECURITY
10 Malicious Software
10.1 Types of Malicious Software (Malware)
10.2 Advanced Persistent Threat
10.3 Propagation—Infected Content—Viruses
10.4 Propagation—Vulnerability Exploit—Worms
10.5 Propagation—Social Engineering—Spam E-mail, Trojans
10.6 Payload—System Corruption
10.7 Payload—Attack Agent—Zombie, Bots
10.8 Payload—Information Theft—Keyloggers, Phishing, Spyware
10.9 Payload—Stealthing—Backdoors, Rootkits
10.10 Countermeasures
10.11 Distributed Denial of Service Attacks
11 Intruders
11.1 Intruders
11.2 Intrusion Detection
11.3 Password Management
12 Firewalls
12.1 The Need for Firewalls
12.2 Firewall Characteristics and Access Policy
12.3 Types of Firewalls
12.4 Firewall Basing
12.5 Firewall Location and Configurations