CYBER SECURITY

CYBER SECURITY

_
iten
Code
90622
ACADEMIC YEAR
2019/2020
CREDITS
5 credits during the 2nd year of 10378 INTERNET AND MULTIMEDIA ENGINEERING (LM-27) GENOVA
SCIENTIFIC DISCIPLINARY SECTOR
ING-INF/05
LANGUAGE
English
TEACHING LOCATION
GENOVA (INTERNET AND MULTIMEDIA ENGINEERING)
semester
1° Semester
Teaching materials

OVERVIEW

The class aims at giving the students the basic knowledge about the main aspects and technologies involved in the network and telecommunication security, including short summaries about privacy issues, blockchain technologies, and the audit and risk assessment procedures. Although the most substantial part of the course is focused on the network and telecommunication security, most of the introductory concepts and techniques included in this course are relevant also for the computer security contest, which is, in any case, briefly introduced and discussed too.

AIMS AND CONTENT

LEARNING OUTCOMES

Cyber Security concepts: terms, requirements, mechanisms, attacks and architectures and models. Cryptography techniques: Symmetric Ciphers, Asymmetric Ciphers, Hash functions. Data integrity and Digital Signature. Protocols for secure communications: link layer, network layer, transport layer. Basic elements of computer security. A summary on blockchain technologies. Privacy and GDPR : a survey. Practical attack examples.

AIMS AND LEARNING OUTCOMES

The main goal of the classes is to provide knowledge on the relevant aspects and techniques for realizing secure network/communication services. The main structure of the course is organized into three parts.

The first part is dedicated to the general concepts in terms of security architectures, models,  services, and essential technologies and tools. These last include the different encryption technologies (classical, symmetric, public-private ) the hash functions, the secure random number generators, the technologies for the assurance of the data integrity, the mechanisms for the digital signatures, and finally the techniques for user authentication and key distribution.

The second part introduces and describes the leading security protocols used in the different network layers, i.e., WIFI security standards for the link layer, the IP-SEC protocol in the network layer, The SSL-TSL suite at the transport layer and the secure email and the web-security at the application layer.

Finally, the last part includes a few additional arguments. More specifically, it presents a survey about computer security, a summary of the blockchain technologies, a high-level view of the privacy problem and GDPR, and few practical examples of simple attacks.

PREREQUISITES

The following arguments represents the minimum knowledge required to the students for following the course in an effective way: 

  • Basic concepts of data networking, 
  • Circuit and packet switching
  • Functional architectures
    • ISO OSI architecture
    • TCP/IP architecture, 
  • Physical layer main characteristics (cables, optical fiber)
  • Data layer basic characteristics
    • Ethernet/IEEE 802.3 protocol
    • Layer 2 bridging/switching
    • WiFI
  • IPv4 basic concepts including routing algorithms and protocols.
  • TCP/UDP basic knowledge.

Teaching methods

Combination of traditional lectures and possibly few laboratory experimental activities.

SYLLABUS/CONTENT

  • Security requirements, security mechanisms, and attacks.
  • Fundamentals of cryptography: classical cryptographic techniques; symmetric ciphers (block ciphers, DES); hash functions; public key cryptography (RSA, Diffie-Hellman, PKI)
  • Data integrity and digital signature
  • User authentication and key distribution
  • Network-Internet Protocols for security
    • Link Layer: WiFi Security
    • Network Layer: IP-Sec
    • Transport Layer: SSL/TSL
    • Application Layer: Secure Email, Web Security
  • Computer System Security
  • Blockchain
  • Privacy (GDPR)
  • Practical attack examples

RECOMMENDED READING/BIBLIOGRAPHY

  1. Course material on Aulaweb: copy of all lecture slides
  2. W. Stallings, Cryptography and Network Security – Principles and Practice (7th Edition), Pearson, 2017
  3. C. Koufman, R. Perlmon, M. Speciner, Network Security – Private Communications in a Public World (2nd Edition), Prectice Hall, 2002

TEACHERS AND EXAM BOARD

Ricevimento: Appointment upon students' requests (direct or by email).

Exam Board

RAFFAELE BOLLA (President)

LESSONS

Teaching methods

Combination of traditional lectures and possibly few laboratory experimental activities.

EXAMS

Exam description

The exam is an oral discussion.

Assessment methods

Oral exam evaluation.

Exam schedule

Date Time Location Type Notes
22/01/2020 10:30 GENOVA Orale
12/02/2020 10:30 GENOVA Orale
10/06/2020 10:30 GENOVA Orale
30/06/2020 10:30 GENOVA Orale
13/07/2020 10:30 GENOVA Orale
10/09/2020 10:30 GENOVA Orale