Network Security
A.Y. 2021/2022
Learning objectives
The objective of the course is to present, in a critical perspective, the basic principles on computer security and to analyze the threats to systems in TCP/IP networks and possible countermeasures. To this purpose, the course will focus on the most important approaches for the definition of security policies, and on the most diffused attacks to network protocols and related infrastructures.
Expected learning outcomes
At the end of the course, the student will know common threats both in local networks and in the infrastructure and will be able to: discuss and design security in complex networked systems; analyze TCP/IP protocols from a security perspective; analyze traffic to discover security problems; build common network defences such as firewalls and network intrusion detection systems; defend user security in untrusted networks.
Lesson period: First semester
Assessment methods: Esame
Assessment result: voto verbalizzato in trentesimi
Single course
This course cannot be attended as a single course. Please check our list of single courses to find the ones available for enrolment.
Course syllabus and organization
Single session
Responsible
Lesson period
First semester
Lessons
Lessons will be held relying on Microsoft Teams platform and will follow the schedule or will also be available asynchronously on the same platform
The content of the course will not have any variation
Remote exams will be held using the exam.net platform, following the guidelines published on the Unimi Website.
Lessons will be held relying on Microsoft Teams platform and will follow the schedule or will also be available asynchronously on the same platform
The content of the course will not have any variation
Remote exams will be held using the exam.net platform, following the guidelines published on the Unimi Website.
Course syllabus
General principles: Security, Malware, Security Policy
Threats to TCP/IP stack :
Ethernet
IP
ARP
TCP
UDP
Port scanning
Traffic analysis:
Perimeter security
Stateless filtering
Stateful filtering
Intrusion detection
Zero Day, polymorphism and botnet
Authentication: Kerberos - Single SIgn On and attacks
Threats to TCP/IP stack :
Ethernet
IP
ARP
TCP
UDP
Port scanning
Traffic analysis:
Perimeter security
Stateless filtering
Stateful filtering
Intrusion detection
Zero Day, polymorphism and botnet
Authentication: Kerberos - Single SIgn On and attacks
Prerequisites for admission
No preliminary knowledge is requested
Teaching methods
Lecture
Teaching Resources
Web site: http://scimatossr.ariel.ctu.unimi.it/v5/home/Default.aspx
Security Engineering R. Anderson, Wiley 2008 http://www.cl.cam.ac.uk/~rja14/book.html
Stallings-Brown Computer Security: Principles and Practice, 4th Edition 2018
Stallings - Cryptography and Network Security: Principles and Practice, 7th Edition 2017
Bishop -Computer Security, 1-2 Edition
Pfleeger - Security in Computing, 5th Edition
Computer Security A Hands-on Approach- Wenliang Du
Computer Security - Dieter Gollmann
Security Engineering R. Anderson, Wiley 2008 http://www.cl.cam.ac.uk/~rja14/book.html
Stallings-Brown Computer Security: Principles and Practice, 4th Edition 2018
Stallings - Cryptography and Network Security: Principles and Practice, 7th Edition 2017
Bishop -Computer Security, 1-2 Edition
Pfleeger - Security in Computing, 5th Edition
Computer Security A Hands-on Approach- Wenliang Du
Computer Security - Dieter Gollmann
Assessment methods and Criteria
The exam consists of a mandatory written test with open answers including a test in laboratory. At the end of the test, the evaluation is expressed on a scale from 0 to 30, taking into account the following parameters: grade of knowledge on the topics, capacity of applying the knowledge to real problems. An optional oral discussion on a topic or on the description of a project can be requested to increase the final evaluation.
Professor(s)