Network Security Ii

A.Y. 2023/2024
6
Max ECTS
48
Overall hours
SSD
INF/01
Language
Italian
Learning objectives
The course has the goal to present in a critical perspective the basic principles on computer security and to analyze the threats to systems in TCP/IP networks and the eventual countermeasures. The course will focus on the most important approaches for the definition of security policies, and on the most diffused attacks to network protocols and related infrastructures.
Expected learning outcomes
At the end of the course, the students will be able to:· Discuss and design security in complex networked systems
· Analyze TCP/IP protocols from a security perspective
· Know common threats both in local networks and in the infrastructure
· Know how to analyze traffic to discover security problems
· Know how to build common network defences such as firewalls and network intrusion detection systems
· Know how to defend user security in untrusted networks.
Single course

This course cannot be attended as a single course. Please check our list of single courses to find the ones available for enrolment.

Course syllabus and organization

Single session

Responsible
Lesson period
First semester
Course syllabus
Security Policies: Classical models (Bell-LaPadula-Clark-Wilson) multilevel-multilateral-RBAC
Advanced attacks to network protocols: TCP/IP, ARP, UDP
Advanced attacks to critical services: DHCP, DNS, BGP
Securing network protocols: DHCP, DNS, BGP
Authentication: Kerberos-SSO and related attacks
Wireless network security
VPN and Onion Routing
Software attacks: Buffer Overflow
Prerequisites for admission
No preliminary knowledge is requested
Teaching methods
Lecture
Teaching Resources
Web site: http://scimatossr.ariel.ctu.unimi.it/v5/home/Default.aspx
Stallings Sicurezza dei computer e delle reti - Pearson 2022
Stallings- Computer Security: Principles and Practice, 4th Edition 2018
Stallings - Cryptography and Network Security: Principles and Practice, 7th Edition 2017
Bishop -Computer Security, 1-2 Edition
Pfleeger - Security in Computing, 5th Edition
Computer Security A Hands-on Approach- Wenliang Du
Computer Security - Dieter Gollmann
Assessment methods and Criteria
The exam consists of a mandatory written test with open answers including a test in laboratory. At the end of the test, the evaluation is expressed on a scale from 0 to 30, taking into account the following parameters: grade of knowledge on the topics, capacity of applying the knowledge to real problems. An optional oral discussion on a topic or on the description of a project can be requested to increase the final evaluation.
INF/01 - INFORMATICS - University credits: 6
Lessons: 48 hours
Professor: Cimato Stelvio
Professor(s)
Reception:
on appointment
Room 6007 - 6th Floor - Via Celoria 18 , Milano