Ugo FIORE | CYBERSECURITY
Ugo FIORE CYBERSECURITY
cod. 0522500075
CYBERSECURITY
0522500075 | |
COMPUTER SCIENCE | |
EQF7 | |
COMPUTER SCIENCE | |
2022/2023 |
YEAR OF COURSE 1 | |
YEAR OF DIDACTIC SYSTEM 2016 | |
SPRING SEMESTER |
SSD | CFU | HOURS | ACTIVITY | |
---|---|---|---|---|
INF/01 | 7 | 56 | LESSONS | |
INF/01 | 2 | 16 | LAB |
Objectives | |
---|---|
KNOWLEDGE AND UNDERSTANDING STUDENTS WILL: •ACQUIRE THE FUNDAMENTAL CYBERSECURITY CONCEPTS, MENACES, AND UNDERLYING TECHNOLOGIES •UNDERSTAND THE BASIC INTERNET SECURITY PRINCIPLES WITHIN THE STATE-OF-THE-ART SECURITY SCENARIO AND THE AVAILABLE DEFENCE STRATEGIES, SOLUTIONS AND TOOLS THROUGH SPECIFIC CASE STUDIES APPLYING KNOWLEDGE AND UNDERSTANDING UPON SUCCESSFUL COMPLETION OF THIS COURSE, THE STUDENT SHOULD BE ABLE TO: •UNDERSTAND THE BASIC PRINCIPLES FOR INFORMATION AND COMMUNICATION SECURITY, AND APPLY THESE PRINCIPLES TO THE EVALUATION AND CRITICAL ANALYSIS OF INFORMATION SYSTEM SECURITY PROPERTIES •IDENTIFY THE VULNERABILITY OF THE INTERNET SYSTEMS AND RECOGNIZE THE MECHANISMS OF THE ATTACKS, AND APPLY THEM TO DESIGN AND EVALUATE COUNTER-MEASURE TOOLS |
Prerequisites | |
---|---|
THE COURSE REQUIRES A BASIC KNOWLEDGE OF TECHNICAL ENGLISH LANGUAGE (PARTICULARLY GOOD ABILITY TO READ AND INTERPRET), AS WELL AS KNOWLEDGE OF: •SECURITY FUNDAMENTALS •COMPUTER NETWORKS |
Contents | |
---|---|
THE COURSE INCLUDES HOURS OF INSTRUCTION IN THE FORM OF LESSONS AND HOURS OF GUIDED EXERCISES DURING WHICH STUDENTS EXPERIENCE DIRECTLY IN AN EMULATION ENVIRONMENT, WHAT IS PRESENTED DURING THE LESSONS (ACCORDING TO A LEARNING-BY-DOING APPROACH). LECTURES TOPICS: •INTRODUCTION AND COURSE OVERVIEW [PFLEEGER SECTION 1; ANDERSON CHAPTER 1] •BACKGROUND ON NETWORKING [PFLEEGER SECTION 7.0, 7.1 (PP. 376-396)] •AUTHENTICATION, AUTHORIZATION AND ACCOUNTING [KAUFMAN CHAPTERS 9 AND 10] •SECURING INTERNET COMMUNICATIONS [PFLEEGER CHAPTER 7.3] •NETWORK ACCESS CONTROL [PFLEEGER SECTION 7.4; PFLEEGER PP. 449-450] •IMPERSONATION/SPOOFING [ANDERSON CHAPTER 2] •ANONIMITY/SNEAKINESS [PFLEEGER PP. 150-160; ANDERSON CHAPTER 17] •SECURITY ISSUES IN INTERNET PROTOCOLS [CHESWICK CHAPTERS 2 AND 3] •NETWORK ATTACKS [PFLEEGER PP. 396-424] •DENIAL OF SERVICE ATTACKS [PFLEEGER PP. 427-432] •DETECTING ATTACKERS [PFLEEGER CHAPTER 7.5 (PP. 484-490); ANDERSON CHAPTER 21.4.3/21.4.4] •TRACING BACK ATTACK ORIGINS •MALWARE AND BOTNETS [STALLINGS CHAPTER 19] •VIRUSES AND WORMS [PFLEEGER CHAPTER 3.3 (PP. 111-141); ANDERSON CHAPTER 21.3] •WWW SECURITY AND DEFENCE [KAUFMAN CHAPTER 25, PFLEEGER PP. 424-427, PFLEEGER PP. 433-437] •INTRUSION DETECTION/PREVENTION SYSTEMS [STALLINGS CHAPTER 18] •FIREWALLS [STALLINGS CHAPTER 20 AND KAUFMAN CHAPTER 23] •ANOMALY DETECTION LAB TOPICS: •EMULATING COMPLEX NETWORKED SYSTEMS WITH GNS3 •IMPLEMENTING FILTERING RULES ACCESS CONTROL STRATEGIES AND POLICIES ON COMMERCIAL ROUTERS •SECURING THE NETWORK BORDER •SIMPLE VULNERABILITY SCANNING •INSTALLING AND CONFIGURING A SIMPLE FIREWALL |
Teaching Methods | |
---|---|
THE ACTIVITIES CONSIST IN 56 HOURS TAUGHT CLASS LECTURES (7 CFUS) AND 16 HOURS (2 CFUS) OF LABORATORY ACTIVITIES, WHICH ARE AN IMPORTANT OPPORTUNITY FOR APPLYING ON A REAL WORLD SCENARIO THE METHODS AND KNOWLEDGE ACQUIRED DURING THE COURSE. STUDENTS ARE GUIDED TO LEARN CRITICALLY AND RESPONSIBLY EVERYTHING IS EXPLAINED TO THEM IN THE CLASSROOM AND ENRICH THEIR JUDGMENT THROUGH THE STUDY OF THE COURSE MATERIAL INDICATED BY THE TEACHER. ATTENDANCE IS STRONGLY RECOMMENDED. STUDENTS MUST BE PREPARED TO SPEND A FAIR AMOUNT OF TIME TO STUDY OUTSIDE OF THE CLASSROOM. A SATISFACTORY PREPARATION TAKES AN AVERAGE OF TWO HOURS OF STUDY FOR EACH HOUR SPENT IN THE CLASSROOM. |
Verification of learning | |
---|---|
ORAL EXAMINATION, WHERE THE STUDENT HAS TO SHOW KNOWLEDGE OF ALL THE TOPICS STUDIED IN THE COURSE. IT MAY BE COMPLEMENTED BY A SPECIFIC PROJECT TASK HAVING THE GOAL OF EVALUATING THE SKILLS OF THE STUDENT IN APPLYING THE TECHNIQUES STUDIED IN THIS COURSE TO SPECIFIC SECURITY DESIGN PROBLEMS. SIX EXAMS ARE SCHEDULED FOR EVERY YEAR. |
Texts | |
---|---|
•PFLEEGER: “SECURITY IN COMPUTING”, 4TH ED., CHARLES P. PFLEEGER, SHARI LAWRENCE PFLEEGER; PRENTICE HALL, 2007 •ANDERSON: “SECURITY ENGINEERING”, 2ND ED., ROSS ANDERSON; WILEY, 2008 •KAUFMAN: “NETWORK SECURITY - PRIVATE COMMUNICATION IN A PUBLIC WORLD”, CHARLIE KAUFMAN, RADIA PERLMAN AND MIKE SPECINER, 2ND EDITION, PRENTICE HALL, 2002 •STALLINGS: “CRYPTOGRAPHY AND NETWORK SECURITY”, WILLIAM STALLINGS, 5TH EDITION, PRENTICE HALL, 2011 •CHESWICK: “FIREWALLS AND INTERNET SECURITY: REPELLING THE WILY HACKER”, 2ND EDITION, WILLIAM R. CHESWICK, STEVEN M. BELLOVIN, AND AVIEL D. RUBIN, ADDISON WESLEY, 2003 |
More Information | |
---|---|
FOR ANY OTHER CLARIFICATION YOU CAN CONTACT FPALMIERI@UNISA.IT |
BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2024-08-21]