Network Security Ii
A.Y. 2023/2024
Learning objectives
The course has the goal to present in a critical perspective the basic principles on computer security and to analyze the threats to systems in TCP/IP networks and the eventual countermeasures. The course will focus on the most important approaches for the definition of security policies, and on the most diffused attacks to network protocols and related infrastructures.
Expected learning outcomes
At the end of the course, the students will be able to:· Discuss and design security in complex networked systems
· Analyze TCP/IP protocols from a security perspective
· Know common threats both in local networks and in the infrastructure
· Know how to analyze traffic to discover security problems
· Know how to build common network defences such as firewalls and network intrusion detection systems
· Know how to defend user security in untrusted networks.
· Analyze TCP/IP protocols from a security perspective
· Know common threats both in local networks and in the infrastructure
· Know how to analyze traffic to discover security problems
· Know how to build common network defences such as firewalls and network intrusion detection systems
· Know how to defend user security in untrusted networks.
Lesson period: First semester
Assessment methods: Esame
Assessment result: voto verbalizzato in trentesimi
Single course
This course cannot be attended as a single course. Please check our list of single courses to find the ones available for enrolment.
Course syllabus and organization
Single session
Responsible
Lesson period
First semester
Course syllabus
Security Policies: Classical models (Bell-LaPadula-Clark-Wilson) multilevel-multilateral-RBAC
Advanced attacks to network protocols: TCP/IP, ARP, UDP
Advanced attacks to critical services: DHCP, DNS, BGP
Securing network protocols: DHCP, DNS, BGP
Authentication: Kerberos-SSO and related attacks
Wireless network security
VPN and Onion Routing
Software attacks: Buffer Overflow
Advanced attacks to network protocols: TCP/IP, ARP, UDP
Advanced attacks to critical services: DHCP, DNS, BGP
Securing network protocols: DHCP, DNS, BGP
Authentication: Kerberos-SSO and related attacks
Wireless network security
VPN and Onion Routing
Software attacks: Buffer Overflow
Prerequisites for admission
No preliminary knowledge is requested
Teaching methods
Lecture
Teaching Resources
Web site: http://scimatossr.ariel.ctu.unimi.it/v5/home/Default.aspx
Stallings Sicurezza dei computer e delle reti - Pearson 2022
Stallings- Computer Security: Principles and Practice, 4th Edition 2018
Stallings - Cryptography and Network Security: Principles and Practice, 7th Edition 2017
Bishop -Computer Security, 1-2 Edition
Pfleeger - Security in Computing, 5th Edition
Computer Security A Hands-on Approach- Wenliang Du
Computer Security - Dieter Gollmann
Stallings Sicurezza dei computer e delle reti - Pearson 2022
Stallings- Computer Security: Principles and Practice, 4th Edition 2018
Stallings - Cryptography and Network Security: Principles and Practice, 7th Edition 2017
Bishop -Computer Security, 1-2 Edition
Pfleeger - Security in Computing, 5th Edition
Computer Security A Hands-on Approach- Wenliang Du
Computer Security - Dieter Gollmann
Assessment methods and Criteria
The exam consists of a mandatory written test with open answers including a test in laboratory. At the end of the test, the evaluation is expressed on a scale from 0 to 30, taking into account the following parameters: grade of knowledge on the topics, capacity of applying the knowledge to real problems. An optional oral discussion on a topic or on the description of a project can be requested to increase the final evaluation.
Educational website(s)
Professor(s)