Network Security
A.Y. 2025/2026
Learning objectives
The course aims to present, from a critical perspective, the principles underlying the security of computer systems and to analyze the threats to which computing systems in TCP/IP networks are exposed and the possible countermeasures. The main attacks on protocols and network infrastructures will be discussed and analyzed, including attacks based on software vulnerabilities and Web-based attacks.
Expected learning outcomes
At the end of the course, students will be able to: Discuss and design the security of networked systems
Analyze TCP/IP protocols from a security perspective
Know the most widespread threats both at the local network level and at the infrastructure level
Know how to defend the privacy of operations in untrusted networks.
Analyze TCP/IP protocols from a security perspective
Know the most widespread threats both at the local network level and at the infrastructure level
Know how to defend the privacy of operations in untrusted networks.
Lesson period: Third four month period
Assessment methods: Esame
Assessment result: voto verbalizzato in trentesimi
Single course
This course cannot be attended as a single course. Please check our list of single courses to find the ones available for enrolment.
Course syllabus and organization
Single session
Responsible
Lesson period
Third four month period
Course syllabus
Advanced attacks to network protocols: TCP/IP, ARP, UDP
Advanced attacks to critical services: DHCP, DNS, BGP
Securing network protocols: DHCP, DNS, BGP
Authentication: Kerberos-SSO and related attacks
Wireless network security
VPN and Onion Routing
Software attacks: Set-UID, Buffer Overflow, ROP, Meltdown, Spectre
Web attacks: CSRF, CSS
Advanced attacks to critical services: DHCP, DNS, BGP
Securing network protocols: DHCP, DNS, BGP
Authentication: Kerberos-SSO and related attacks
Wireless network security
VPN and Onion Routing
Software attacks: Set-UID, Buffer Overflow, ROP, Meltdown, Spectre
Web attacks: CSRF, CSS
Prerequisites for admission
No preliminary knowledge is requested
Teaching methods
Lecture
Teaching Resources
Web site: http://scimatossr.ariel.ctu.unimi.it/v5/home/Default.aspx
Stallings Sicurezza dei computer e delle reti - Pearson 2022
Stallings- Computer Security: Principles and Practice, 4th Edition 2018
Stallings - Cryptography and Network Security: Principles and Practice, 7th Edition 2017
Bishop -Computer Security, 1-2 Edition
Pfleeger - Security in Computing, 5th Edition
Computer Security A Hands-on Approach- Wenliang Du
Computer Security - Dieter Gollmann
Stallings Sicurezza dei computer e delle reti - Pearson 2022
Stallings- Computer Security: Principles and Practice, 4th Edition 2018
Stallings - Cryptography and Network Security: Principles and Practice, 7th Edition 2017
Bishop -Computer Security, 1-2 Edition
Pfleeger - Security in Computing, 5th Edition
Computer Security A Hands-on Approach- Wenliang Du
Computer Security - Dieter Gollmann
Assessment methods and Criteria
The exam consists of a mandatory written test with open answers including a test in laboratory. At the end of the test, the evaluation is expressed on a scale from 0 to 30, taking into account the following parameters: grade of knowledge on the topics, capacity of applying the knowledge to real problems. An optional oral discussion on a topic or on the description of a project can be requested to increase the final evaluation.
Professor(s)