Insegnamento INTRODUZIONE ALLA SICUREZZA INFORMATICA

Corso
Informatica
Codice insegnamento
A000702
Curriculum
Comune a tutti i curricula
Docente
Stefano Bistarelli
Docenti
  • Stefano Bistarelli
Ore
  • 42 ore - Stefano Bistarelli
CFU
6
Regolamento
Coorte 2020
Erogato
2022/23
Attività
Caratterizzante
Ambito
Discipline informatiche
Settore
INF/01
Tipo insegnamento
Opzionale (Optional)
Tipo attività
Attività formativa monodisciplinare
Lingua insegnamento
ITALIANO
Contenuti
1 Introduction

PART ONE: CRYPTOGRAPHY
2 Symmetric Encryption and Message Confidentiality
3 Public-Key Cryptography and Message Authentication

PART TWO: NETWORK SECURITY APPLICATIONS
4 Key Distribution and User Authentication
5 Network Access Control and Cloud Security
6 Transport-Level Security
7 Wireless Network Security
8 Electronic Mail Security
9 IP Security


PART THREE: SYSTEM SECURITY
10 Malicious Software
11 Intruders
12 Firewalls
Testi di riferimento
Network Security Essentials: Applications and Standards, Global Edition
By: William Stallings
Publisher: Pearson (Intl)
Print ISBN: 9781292154855, 1292154853
eText ISBN: 9781292154916, 1292154918
Edition: 6th
Copyright year: 2017
Obiettivi formativi
Capire il significato di sicurezza informatica nei suoi attributi di confidenzialità, integrità e disponibilità.
Capire le problematiche dei sistemi Sicuri ma connessi su reti insicure.
Capire le nozioni più importanti di sicurezza informatica, sicurezza di rete.
Prerequisiti
nessuno in particolare
Metodi didattici
Lezioni frontali e di laboratorio. Possibili seminari di ospiti.
Altre informazioni
Frequenza è fortemente consigliata.
Modalità di verifica dell'apprendimento
Colloquio orale della durata media di 30 minuti su argomenti di tutto il programma che evidenzia le capacità espositive dello studente, le sue capacità d'utilizzo appropriato di tecniche e nozioni fondamentali e l'approfondimento dello studio.
Possibilità di specifici progetti o seminari.
Su richiesta dello studente l'esame può' essere sostenuto in lingua Italiana o Inglese.

Per informazioni sui servizi di supporto agli studenti con disabilità e/o DSA visita la pagina http://www.unipg.it/disabilita-e-dsa
Programma esteso
1 Introduction
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 Fundamental Security Design Principles
1.7 Attack Surfaces and Attack Trees
1.8 A Model for Network Security
1.9 Standards

PART ONE: CRYPTOGRAPHY
2 Symmetric Encryption and Message Confidentiality
2.1 Symmetric Encryption Principles
2.2 Symmetric Block Encryption Algorithms
2.3 Random and Pseudorandom Numbers
2.4 Stream Ciphers and RC4
2.5 Cipher Block Modes of Operation
3 Public-Key Cryptography and Message Authentication
3.1 Approaches to Message Authentication
3.2 Secure Hash Functions
3.3 Message Authentication Codes
3.4 Public-Key Cryptography Principles
3.5 Public-Key Cryptography Algorithms
3.6 Digital Signatures

PART TWO: NETWORK SECURITY APPLICATIONS
4 Key Distribution and User Authentication
4.1 Remote User Authentication Principles
4.2 Symmetric Key Distribution Using
Symmetric Encryption
4.3 Kerberos
4.4 Key Distribution Using Asymmetric Encryption
4.5 X.509 Certificates
4.6 Public-Key Infrastructure
4.7 Federated Identity Management
5 Network Access Control and Cloud Security
5.1 Network Access Control
5.2 Extensible Authentication Protocol
5.3 IEEE 802.1X Port-Based Network Access Control
5.4 Cloud Computing
5.5 Cloud Security Risks and Countermeasures
5.6 Data Protection in the Cloud
5.7 Cloud Security as a Service
5.8 Addressing Cloud Computing Security Concerns
6 Transport-Level Security
6.1Web Security Considerations
6.2 Transport Layer Security
6.3 HTTPS
6.4 Secure Shell (SSH)
7 Wireless Network Security
7.1 Wireless Security
7.2 Mobile Device Security
7.3 IEEE 802.11 Wireless LAN Overview
7.4 IEEE 802.11i Wireless LAN Security
8 Electronic Mail Security
8.1 Internet Mail Architecture
8.2 E-mail Formats
8.3 E-mail Threats and Comprehensive E-mail Security
8.4 S/MIME
8.5 Pretty Good Privacy
8.6 DNSSEC
8.7 DNS-Based Authentication of Named Entities
8.8 Sender Policy Framework
8.9 DomainKeys Identified Mail
8.10 Domain-Based Message Authentication, Reporting, and Conformance
9 IP Security
9.1 IP Security Overview
9.2 IP Security Policy
9.3 Encapsulating Security Payload
9.4 Combining Security Associations
9.5 Internet Key Exchange
9.6 Cryptographic Suites

PART THREE: SYSTEM SECURITY
10 Malicious Software
10.1 Types of Malicious Software (Malware)
10.2 Advanced Persistent Threat
10.3 Propagation—Infected Content—Viruses
10.4 Propagation—Vulnerability Exploit—Worms
10.5 Propagation—Social Engineering—Spam E-mail, Trojans
10.6 Payload—System Corruption
10.7 Payload—Attack Agent—Zombie, Bots
10.8 Payload—Information Theft—Keyloggers, Phishing, Spyware
10.9 Payload—Stealthing—Backdoors, Rootkits
10.10 Countermeasures
10.11 Distributed Denial of Service Attacks
11 Intruders
11.1 Intruders
11.2 Intrusion Detection
11.3 Password Management
12 Firewalls
12.1 The Need for Firewalls
12.2 Firewall Characteristics and Access Policy
12.3 Types of Firewalls
12.4 Firewall Basing
12.5 Firewall Location and Configurations
Condividi su