Systems and networks security

A.Y. 2019/2020
Lesson for
12
Max ECTS
96
Overall hours
SSD
INF/01
Language
Italian
Learning objectives
To develop a critical perspective on threats and defence approaches for systems in TCP/IP networks.
· Discussing and designing security in complex networked systems
· Analyzing TCP/IP protocols from a security perspective
· Knowing common threats
◦ in local networks
◦ in the infrastructure
· Knowing to analyze traffic to discover security problems
· Knowing how to build common network defences
◦ firewalls
◦ network intrusion detection systems
· Knowing how to defend user security in untrusted networks.

Course structure and Syllabus

Active edition
Yes
Responsible
Modulo A - Sicurezza dei sistemi e delle reti
INF/01 - INFORMATICS - University credits: 6
Lessons: 48 hours
Professor: Cimato Stelvio
Modulo B - Sicurezza dei sistemi e delle reti
INF/01 - INFORMATICS - University credits: 6
Lessons: 48 hours
Modulo A - Sicurezza dei sistemi e delle reti
Syllabus
10. General principles
11. Threats to TCP/IP stack
1. Ethernet
2. IP
3. ARP
4. TCP
5. UDP
6. Intrinsic problems
7. Port scanning
12. Traffic analysis
13. Perimeter security
1. Stateless filtering
2. Stateful filtering
3. Deep packet inspection
4. Effects of firewalls
5. Proxy
6. NAT
14. Intrusion detection
1. Misuse detection
2. Anomaly detection
3. False positives
4. Architectural choices
5. Zero Day
6. Polymorphism
7. Botnet
15. Protection of network infrastructure
16. Protection of critical services
17. Peculiarities of wireless networks
18. Protection in untrusted networks
Modulo B - Sicurezza dei sistemi e delle reti
Syllabus
10. General principles
11. Threats to TCP/IP stack
1. Ethernet
2. IP
3. ARP
4. TCP
5. UDP
6. Intrinsic problems
7. Port scanning
12. Traffic analysis
13. Perimeter security
1. Stateless filtering
2. Stateful filtering
3. Deep packet inspection
4. Effects of firewalls
5. Proxy
6. NAT
14. Intrusion detection
1. Misuse detection
2. Anomaly detection
3. False positives
4. Architectural choices
5. Zero Day
6. Polymorphism
7. Botnet
15. Protection of network infrastructure
16. Protection of critical services
17. Peculiarities of wireless networks
18. Protection in untrusted networks
Lesson period
First semester
Lesson period
First semester
Assessment methods
Esame
Assessment result
voto verbalizzato in trentesimi