System and Network Security
A.Y. 2018/2019
Learning objectives
To develop a critical perspective on threats and defence approaches for systems in TCP/IP networks.
Expected learning outcomes
· Discussing and designing security in complex networked systems
· Analyzing TCP/IP protocols from a security perspective
· Knowing common threats
◦ in local networks
◦ in the infrastructure
· Knowing to analyze traffic to discover security problems
· Knowing how to build common network defences
◦ firewalls
◦ network intrusion detection systems
· Knowing how to defend user security in untrusted networks.
· Analyzing TCP/IP protocols from a security perspective
· Knowing common threats
◦ in local networks
◦ in the infrastructure
· Knowing to analyze traffic to discover security problems
· Knowing how to build common network defences
◦ firewalls
◦ network intrusion detection systems
· Knowing how to defend user security in untrusted networks.
Lesson period: First semester
Assessment methods: Esame
Assessment result: voto verbalizzato in trentesimi
Single course
This course cannot be attended as a single course. Please check our list of single courses to find the ones available for enrolment.
Course syllabus and organization
Erogazione in videoconferenza a Crema e Milano
Responsible
Lesson period
First semester
Modulo A - Sicurezza dei sistemi e delle reti
Course syllabus
10. General principles
11. Threats to TCP/IP stack
1. Ethernet
2. IP
3. ARP
4. TCP
5. UDP
6. Intrinsic problems
7. Port scanning
12. Traffic analysis
13. Perimeter security
1. Stateless filtering
2. Stateful filtering
3. Deep packet inspection
4. Effects of firewalls
5. Proxy
6. NAT
14. Intrusion detection
1. Misuse detection
2. Anomaly detection
3. False positives
4. Architectural choices
5. Zero Day
6. Polymorphism
7. Botnet
15. Protection of network infrastructure
16. Protection of critical services
17. Peculiarities of wireless networks
18. Protection in untrusted networks
11. Threats to TCP/IP stack
1. Ethernet
2. IP
3. ARP
4. TCP
5. UDP
6. Intrinsic problems
7. Port scanning
12. Traffic analysis
13. Perimeter security
1. Stateless filtering
2. Stateful filtering
3. Deep packet inspection
4. Effects of firewalls
5. Proxy
6. NAT
14. Intrusion detection
1. Misuse detection
2. Anomaly detection
3. False positives
4. Architectural choices
5. Zero Day
6. Polymorphism
7. Botnet
15. Protection of network infrastructure
16. Protection of critical services
17. Peculiarities of wireless networks
18. Protection in untrusted networks
Modulo B - Sicurezza dei sistemi e delle reti
Course syllabus
10. General principles
11. Threats to TCP/IP stack
1. Ethernet
2. IP
3. ARP
4. TCP
5. UDP
6. Intrinsic problems
7. Port scanning
12. Traffic analysis
13. Perimeter security
1. Stateless filtering
2. Stateful filtering
3. Deep packet inspection
4. Effects of firewalls
5. Proxy
6. NAT
14. Intrusion detection
1. Misuse detection
2. Anomaly detection
3. False positives
4. Architectural choices
5. Zero Day
6. Polymorphism
7. Botnet
15. Protection of network infrastructure
16. Protection of critical services
17. Peculiarities of wireless networks
18. Protection in untrusted networks
11. Threats to TCP/IP stack
1. Ethernet
2. IP
3. ARP
4. TCP
5. UDP
6. Intrinsic problems
7. Port scanning
12. Traffic analysis
13. Perimeter security
1. Stateless filtering
2. Stateful filtering
3. Deep packet inspection
4. Effects of firewalls
5. Proxy
6. NAT
14. Intrusion detection
1. Misuse detection
2. Anomaly detection
3. False positives
4. Architectural choices
5. Zero Day
6. Polymorphism
7. Botnet
15. Protection of network infrastructure
16. Protection of critical services
17. Peculiarities of wireless networks
18. Protection in untrusted networks
Modulo A - Sicurezza dei sistemi e delle reti
INF/01 - INFORMATICS - University credits: 6
Lessons: 48 hours
Professor:
Cimato Stelvio
Modulo B - Sicurezza dei sistemi e delle reti
INF/01 - INFORMATICS - University credits: 6
Lessons: 48 hours
Professors:
Bellandi Valerio, Cimato Stelvio
Professor(s)
Reception:
On appointment
room 7008