Ugo FIORE | CYBERSECURITY
Ugo FIORE CYBERSECURITY
cod. 0522500075
CYBERSECURITY
0522500075 | |
COMPUTER SCIENCE | |
EQF7 | |
COMPUTER SCIENCE | |
2024/2025 |
YEAR OF COURSE 1 | |
YEAR OF DIDACTIC SYSTEM 2016 | |
SPRING SEMESTER |
SSD | CFU | HOURS | ACTIVITY | |
---|---|---|---|---|
INF/01 | 7 | 56 | LESSONS | |
INF/01 | 2 | 16 | LAB |
Objectives | |
---|---|
THE COURSE AIMS TO PROVIDE AN ADEQUATE METHODOLOGICAL/STRATEGIC CULTURAL FRAMEWORK BY BUILDING THE ECOSYSTEM OF CYBERSECURITY SKILLS SUITABLE FOR MANAGING TOOLS AND ARCHITECTURES TO SUPPORT IT SECURITY. KNOWLEDGE AND UNDERSTANDING STUDENTS WILL: •ACQUIRE THE FUNDAMENTAL CYBERSECURITY CONCEPTS, MENACES, AND UNDERLYING TECHNOLOGIES •UNDERSTAND THE BASIC INTERNET SECURITY PRINCIPLES WITHIN THE STATE-OF-THE-ART SECURITY SCENARIO AND THE AVAILABLE DEFENCE STRATEGIES, SOLUTIONS AND TOOLS THROUGH SPECIFIC CASE STUDIES APPLYING KNOWLEDGE AND UNDERSTANDING: UPON SUCCESSFUL COMPLETION OF THIS COURSE, THE STUDENT SHOULD BE ABLE TO: •UNDERSTAND THE BASIC PRINCIPLES FOR INFORMATION AND COMMUNICATION SECURITY, AND APPLY THESE PRINCIPLES TO THE EVALUATION AND CRITICAL ANALYSIS OF INFORMATION SYSTEM SECURITY PROPERTIES •IDENTIFY THE VULNERABILITY OF INTERCONNECTED SYSTEMS AND RECOGNIZE THE ATTACK AND DEFENSE MECHANISMS AND APPLY THEM TO DESIGN AND EVALUATE COUNTER-MEASURES AND SECURE ARCHITECTURES •ADOPTING A CORRECT RISK MANAGEMENT POLICY TO PROTECT THE SYSTEMS AND INFRASTRUCTURES, AS WELL AS ENSURING THE CAPACITY TO REACT IMMEDIATELY EVEN TO LARGE-SCALE ATTACKS, WHICH INVOLVE A PLURALITY OF SUBJECTS AUTONOMOUS REASONING: THE STUDENT WILL BE ABLE TO: • REASON CRITICALLY AND DISCUSS DESIGN AND IMPLEMENTATION CHOICES; • DEVELOP INDEPENDENT REASONING AND REFLECTION; • EVALUATE THE SECURITY OF COMPLEX NETWORK SYSTEMS; • CRITICALLY EVALUATE POSITIVE AND NEGATIVE ASPECTS OF ALTERNATIVE SOLUTIONS, TAKING INTO CONSIDERATION QUALITY AND COST/EFFECTIVENESS; • ESTABLISH AN ORDER OF PRIORITY TO OFTEN CONTRAST OBJECTIVES; • MAKING DECISIONS INCLUDING REFLECTION ON THE SOCIAL AND ETHICAL RESPONSIBILITIES CONNECTED WITH THE OPERATION OF SUCH SOLUTIONS IN ORDER TO USE THE ATTACK TECHNIQUES LEARNED ONLY IN ORDER TO IMPROVE THE LEVEL OF IT SECURITY OF AN ORGANIZATION COMMUNICATION SKILLS: THE STUDENT WILL BE ABLE TO: • PRESENT THE RESULTS OF AN EVALUATION AND/OR AN ASSESSMENT IN A SPECIFIC CONTEXT, GIVING THE RIGHT EVIDENCE OF THE RISKS AND THE COUNTERMEASURES/ACTIONS TO BE TAKEN; • PRESENT AND DISCUSS THE RESULTS OF AN ANALYSIS EVEN IN THE CONTEXT OF A PUBLIC CONFERENCE OR FORENSIC DEBATE. |
Prerequisites | |
---|---|
THE COURSE REQUIRES A BASIC KNOWLEDGE OF TECHNICAL ENGLISH LANGUAGE (PARTICULARLY GOOD ABILITY TO READ AND INTERPRET), AS WELL AS KNOWLEDGE OF: •SECURITY FUNDAMENTALS •COMPUTER NETWORKS |
Contents | |
---|---|
THE COURSE INCLUDES HOURS OF INSTRUCTION IN THE FORM OF LESSONS AND HOURS OF GUIDED EXERCISES DURING WHICH STUDENTS EXPERIENCE DIRECTLY IN AN EMULATION ENVIRONMENT, WHAT IS PRESENTED DURING THE LESSONS (ACCORDING TO A LEARNING-BY-DOING APPROACH). LECTURES TOPICS: •INTRODUCTION AND COURSE OVERVIEW [PFLEEGER SECTION 1; ANDERSON CHAPTER 1] •BACKGROUND ON NETWORKING [PFLEEGER SECTION 7.0, 7.1 (PP. 376-396)] •AUTHENTICATION, AUTHORIZATION AND ACCOUNTING [KAUFMAN CHAPTERS 9 AND 10] •SECURING INTERNET COMMUNICATIONS [PFLEEGER CHAPTER 7.3] •NETWORK ACCESS CONTROL [PFLEEGER SECTION 7.4; PFLEEGER PP. 449-450] •IMPERSONATION/SPOOFING [ANDERSON CHAPTER 2] •ANONIMITY/SNEAKINESS [PFLEEGER PP. 150-160; ANDERSON CHAPTER 17] •SECURITY ISSUES IN INTERNET PROTOCOLS [CHESWICK CHAPTERS 2 AND 3] •NETWORK ATTACKS [PFLEEGER PP. 396-424] •DENIAL OF SERVICE ATTACKS [PFLEEGER PP. 427-432] •DETECTING ATTACKERS [PFLEEGER CHAPTER 7.5 (PP. 484-490); ANDERSON CHAPTER 21.4.3/21.4.4] •TRACING BACK ATTACK ORIGINS •MALWARE AND BOTNETS [STALLINGS CHAPTER 19] •VIRUSES AND WORMS [PFLEEGER CHAPTER 3.3 (PP. 111-141); ANDERSON CHAPTER 21.3] •WWW SECURITY AND DEFENCE [KAUFMAN CHAPTER 25, PFLEEGER PP. 424-427, PFLEEGER PP. 433-437] •INTRUSION DETECTION/PREVENTION SYSTEMS [STALLINGS CHAPTER 18] •FIREWALLS [STALLINGS CHAPTER 20 AND KAUFMAN CHAPTER 23] •ANOMALY DETECTION LAB TOPICS: •EMULATING COMPLEX NETWORKED SYSTEMS WITH GNS3 •IMPLEMENTING FILTERING RULES ACCESS CONTROL STRATEGIES AND POLICIES ON COMMERCIAL ROUTERS •SECURING THE NETWORK BORDER •SIMPLE VULNERABILITY SCANNING •INSTALLING AND CONFIGURING A SIMPLE FIREWALL |
Teaching Methods | |
---|---|
THE ACTIVITIES CONSIST IN 56 HOURS TAUGHT CLASS LECTURES (7 CFUS) AND 16 HOURS (2 CFUS) OF LABORATORY ACTIVITIES, WHICH ARE AN IMPORTANT OPPORTUNITY FOR APPLYING ON A REAL WORLD SCENARIO THE METHODS AND KNOWLEDGE ACQUIRED DURING THE COURSE. STUDENTS ARE GUIDED TO LEARN CRITICALLY AND RESPONSIBLY EVERYTHING IS EXPLAINED TO THEM IN THE CLASSROOM AND ENRICH THEIR JUDGMENT THROUGH THE STUDY OF THE COURSE MATERIAL INDICATED BY THE TEACHER. ATTENDANCE IS STRONGLY RECOMMENDED. STUDENTS MUST BE PREPARED TO SPEND A FAIR AMOUNT OF TIME TO STUDY OUTSIDE OF THE CLASSROOM. A SATISFACTORY PREPARATION TAKES AN AVERAGE OF TWO HOURS OF STUDY FOR EACH HOUR SPENT IN THE CLASSROOM. |
Verification of learning | |
---|---|
ORAL EXAMINATION, WHERE THE STUDENT HAS TO SHOW KNOWLEDGE OF ALL THE TOPICS STUDIED IN THE COURSE. IT MAY BE COMPLEMENTED BY A SPECIFIC PROJECT TASK HAVING THE GOAL OF EVALUATING THE SKILLS OF THE STUDENT IN APPLYING THE TECHNIQUES STUDIED IN THIS COURSE TO SPECIFIC SECURITY DESIGN PROBLEMS. SIX EXAMS ARE SCHEDULED FOR EVERY YEAR. |
Texts | |
---|---|
•PFLEEGER: “SECURITY IN COMPUTING”, 4TH ED., CHARLES P. PFLEEGER, SHARI LAWRENCE PFLEEGER; PRENTICE HALL, 2007 •ANDERSON: “SECURITY ENGINEERING”, 2ND ED., ROSS ANDERSON; WILEY, 2008 •KAUFMAN: “NETWORK SECURITY - PRIVATE COMMUNICATION IN A PUBLIC WORLD”, CHARLIE KAUFMAN, RADIA PERLMAN AND MIKE SPECINER, 2ND EDITION, PRENTICE HALL, 2002 •STALLINGS: “CRYPTOGRAPHY AND NETWORK SECURITY”, WILLIAM STALLINGS, 5TH EDITION, PRENTICE HALL, 2011 •CHESWICK: “FIREWALLS AND INTERNET SECURITY: REPELLING THE WILY HACKER”, 2ND EDITION, WILLIAM R. CHESWICK, STEVEN M. BELLOVIN, AND AVIEL D. RUBIN, ADDISON WESLEY, 2003 |
More Information | |
---|---|
FOR ANY OTHER CLARIFICATION YOU CAN CONTACT FPALMIERI@UNISA.IT |
BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2024-11-29]