System and Network Security
A.Y. 2024/2025
Learning objectives
The course has the goal to present in a critical perspective the basic principles on computer security and to analyze the threats to systems in TCP/IP networks and the eventual countermeasures. The course will focus on the most important approaches for the definition of security policies, and on the most diffused attacks to network protocols and related infrastructures.
Expected learning outcomes
At the end of the course, the students will be able to:· Discuss and design security in complex networked systems
· Analyze TCP/IP protocols from a security perspective
· Know common threats both in local networks and in the infrastructure
· Know how to analyze traffic to discover security problems
· Know how to build common network defences such as firewalls and network intrusion detection systems
· Know how to defend user security in untrusted networks.
· Analyze TCP/IP protocols from a security perspective
· Know common threats both in local networks and in the infrastructure
· Know how to analyze traffic to discover security problems
· Know how to build common network defences such as firewalls and network intrusion detection systems
· Know how to defend user security in untrusted networks.
Lesson period: First semester
Assessment methods: Esame
Assessment result: voto verbalizzato in trentesimi
Single course
This course can be attended as a single course.
Course syllabus and organization
Single session
Responsible
Lesson period
First semester
Course syllabus
General principles: Security and Security Policies
Malware classification: Zero Day, polymorphism and botnet
Threats to ISO/OSI stack
Threats to TCP/IP, ARP, UDP
Port scanning
Traffic analysis: Wireshar
Perimeter security: Firewall, Stateless filtering and Stateful filtering
Intrusion detection: IDS
Threats to critical services: DHCP, DNS, BGP
Malware classification: Zero Day, polymorphism and botnet
Threats to ISO/OSI stack
Threats to TCP/IP, ARP, UDP
Port scanning
Traffic analysis: Wireshar
Perimeter security: Firewall, Stateless filtering and Stateful filtering
Intrusion detection: IDS
Threats to critical services: DHCP, DNS, BGP
Prerequisites for admission
No preliminary knowledge is requested
Teaching methods
Lecture
Teaching Resources
Web site: http://scimatossr.ariel.ctu.unimi.it/v5/home/Default.aspx
Stallings Sicurezza dei computer e delle reti - Pearson 2022
Bishop -Computer Security, 1-2 Edition
Pfleeger - Security in Computing, 5th Edition
Computer Security A Hands-on Approach- Wenliang Du
Computer Security - Dieter Gollmann
Stallings Sicurezza dei computer e delle reti - Pearson 2022
Bishop -Computer Security, 1-2 Edition
Pfleeger - Security in Computing, 5th Edition
Computer Security A Hands-on Approach- Wenliang Du
Computer Security - Dieter Gollmann
Assessment methods and Criteria
The exam consists of a mandatory written test with open answers including a test in laboratory. At the end of the test, the evaluation is expressed on a scale from 0 to 30, taking into account the following parameters: grade of knowledge on the topics, capacity of applying the knowledge to real problems. An optional oral discussion on a topic or on the description of a project can be requested to increase the final evaluation.
INF/01 - INFORMATICS - University credits: 6
Lessons: 48 hours
Professors:
Anisetti Marco, Cimato Stelvio
Professor(s)