Study-unit INTRODUCTION TO COMPUTER SECURITY

Course name Informatics
Study-unit Code A000702
Curriculum Comune a tutti i curricula
Lecturer Stefano Bistarelli
Lecturers
  • Stefano Bistarelli
Hours
  • 42 ore - Stefano Bistarelli
CFU 6
Course Regulation Coorte 2022
Supplied 2024/25
Supplied other course regulation
Learning activities Caratterizzante
Area Discipline informatiche
Sector INF/01
Type of study-unit Opzionale (Optional)
Type of learning activities Attività formativa monodisciplinare
Language of instruction Italian
Contents 1 Introduction

PART ONE: CRYPTOGRAPHY
2 Symmetric Encryption and Message Confidentiality
3 Public-Key Cryptography and Message Authentication

PART TWO: NETWORK SECURITY APPLICATIONS
4 Key Distribution and User Authentication
5 Network Access Control and Cloud Security
6 Transport-Level Security
7 Wireless Network Security
8 Electronic Mail Security
9 IP Security


PART THREE: SYSTEM SECURITY
10 Malicious Software
11 Intruders
12 Firewalls
Reference texts Network Security Essentials: Applications and Standards, Global Edition
By: William Stallings
Publisher: Pearson (Intl)
Print ISBN: 9781292154855, 1292154853
eText ISBN: 9781292154916, 1292154918
Edition: 6th
Copyright year: 2017
Educational objectives To understand the meaning of Information Security and of the Confidentiality, Integrity and Availability attributes.
Understand the problem of connectinf secure systems over unsecure networks.
Understand the basic notions of Information Security, Computer Security and Network Security.
Prerequisites none
Teaching methods Face-to-face and laboratory. possibility of seminars by different guests
Other information Frequency of the lessons is strongly suggested
Learning verification modality Oral interview lasting an average of 30 minutes on topics of covering all the program of the course. Possibility of specific projects or seminars.
At the request of the student examination can 'be done in Italian or English.
Extended program 1 Introduction
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 Fundamental Security Design Principles
1.7 Attack Surfaces and Attack Trees
1.8 A Model for Network Security
1.9 Standards

PART ONE: CRYPTOGRAPHY
2 Symmetric Encryption and Message Confidentiality
2.1 Symmetric Encryption Principles
2.2 Symmetric Block Encryption Algorithms
2.3 Random and Pseudorandom Numbers
2.4 Stream Ciphers and RC4
2.5 Cipher Block Modes of Operation
3 Public-Key Cryptography and Message Authentication
3.1 Approaches to Message Authentication
3.2 Secure Hash Functions
3.3 Message Authentication Codes
3.4 Public-Key Cryptography Principles
3.5 Public-Key Cryptography Algorithms
3.6 Digital Signatures

PART TWO: NETWORK SECURITY APPLICATIONS
4 Key Distribution and User Authentication
4.1 Remote User Authentication Principles
4.2 Symmetric Key Distribution Using
Symmetric Encryption
4.3 Kerberos
4.4 Key Distribution Using Asymmetric Encryption
4.5 X.509 Certificates
4.6 Public-Key Infrastructure
4.7 Federated Identity Management
5 Network Access Control and Cloud Security
5.1 Network Access Control
5.2 Extensible Authentication Protocol
5.3 IEEE 802.1X Port-Based Network Access Control
5.4 Cloud Computing
5.5 Cloud Security Risks and Countermeasures
5.6 Data Protection in the Cloud
5.7 Cloud Security as a Service
5.8 Addressing Cloud Computing Security Concerns
6 Transport-Level Security
6.1Web Security Considerations
6.2 Transport Layer Security
6.3 HTTPS
6.4 Secure Shell (SSH)
7 Wireless Network Security
7.1 Wireless Security
7.2 Mobile Device Security
7.3 IEEE 802.11 Wireless LAN Overview
7.4 IEEE 802.11i Wireless LAN Security
8 Electronic Mail Security
8.1 Internet Mail Architecture
8.2 E-mail Formats
8.3 E-mail Threats and Comprehensive E-mail Security
8.4 S/MIME
8.5 Pretty Good Privacy
8.6 DNSSEC
8.7 DNS-Based Authentication of Named Entities
8.8 Sender Policy Framework
8.9 DomainKeys Identified Mail
8.10 Domain-Based Message Authentication, Reporting, and Conformance
9 IP Security
9.1 IP Security Overview
9.2 IP Security Policy
9.3 Encapsulating Security Payload
9.4 Combining Security Associations
9.5 Internet Key Exchange
9.6 Cryptographic Suites

PART THREE: SYSTEM SECURITY
10 Malicious Software
10.1 Types of Malicious Software (Malware)
10.2 Advanced Persistent Threat
10.3 Propagation—Infected Content—Viruses
10.4 Propagation—Vulnerability Exploit—Worms
10.5 Propagation—Social Engineering—Spam E-mail, Trojans
10.6 Payload—System Corruption
10.7 Payload—Attack Agent—Zombie, Bots
10.8 Payload—Information Theft—Keyloggers, Phishing, Spyware
10.9 Payload—Stealthing—Backdoors, Rootkits
10.10 Countermeasures
10.11 Distributed Denial of Service Attacks
11 Intruders
11.1 Intruders
11.2 Intrusion Detection
11.3 Password Management
12 Firewalls
12.1 The Need for Firewalls
12.2 Firewall Characteristics and Access Policy
12.3 Types of Firewalls
12.4 Firewall Basing
12.5 Firewall Location and Configurations

Digital Information Service by Lidia Pozzoblu - Thanks to Aldo Bizzilupo for Web site and other technical assistance.