Servizi per la didattica
PORTALE DELLA DIDATTICA

Information systems security

01TYMOV, 01TYMSM

A.A. 2020/21

2020/21

Information systems security

This course deals with security issues in modern networked computer systems, paying special attention to data security and protection of computer networks and networked computer applications, in a closed (Intranet) or open (Internet) environment. The course aims to teach the skills needed to perform both the analysis and the high-level design of the security features of IT components and systems.

Information systems security

This course deals with security issues in modern networked computer systems, paying special attention to data security and protection of computer networks and networked computer applications, in a closed (Intranet) or open (Internet) environment. The course aims to teach the skills needed to perform both the analysis and the high-level design of the security features of IT components and systems.

Information systems security

Knowledge of the main categories of attack against IT systems. Knowledge and critical evaluation of the main concepts (encryption and digest) and technologies (PKI, firewall, VPN, TLS, S/MIME, e-documents) for IT security. Knowledge and critical evaluation of the security architectures for authentication and access control and ability to tailor them to the protection of IT systems. Ability to analyse the risks of a network application and design a solution for its protection.

Information systems security

Knowledge of the main categories of attack against IT systems. Knowledge and critical evaluation of the main concepts (encryption and digest) and technologies (PKI, firewall, VPN, TLS, S/MIME, e-documents) for IT security. Knowledge and critical evaluation of the security architectures for authentication and access control and ability to tailor them to the protection of IT systems. Ability to analyse the risks of a network application and design a solution for its protection.

Information systems security

Foundations of telecommunication systems. Local and wide area networks, wired and wireless (Ethernet, ADSL, WiFI, GSM, IP, routing, ...). TCP/IP networks and applications. High-level programming (C, C++, or Java) and web programming (JS, PHP). Operating systems and database.

Information systems security

Foundations of telecommunication systems. Local and wide area networks, wired and wireless (Ethernet, ADSL, WiFI, GSM, IP, routing, ...). TCP/IP networks and applications. High-level programming (C, C++, or Java) and web programming (JS, PHP). Operating systems and database.

Information systems security

(1 CFU) Computer systems (in)security: problems and attacks (sniffing, spoofing, DOS, …), risk analysis. (1 CFU) Basic protection techniques: steganography, cryptography, digest, X.509 certificates, certification authorities (CA) and public-key infrastructures (PKI). (1 CFU) Authentication techniques (password, challenges, Kerberos) and related hardware devices (token and smart-card). (1 CFU) Network security: the IPsec standard to protect IP networks; security of the network configuration and management protocols; firewall and IDS to create protected subnets; virtual private networks (VPN); security of wireless networks. (1 CFU) Application security: e-mail protection (PGP, S/MIME), web security (SSL, TLS) and remote access protection (SSH, TLS), securing web applications. (1 CFU) Secure document workflow and e-commerce; national and international legislation about IT security; digital signature, electronic documents, GDPR (General Data Protection Regulation), forensic analysis.

Information systems security

(1 CFU) Computer systems (in)security: problems and attacks (sniffing, spoofing, DOS, …), risk analysis. (1 CFU) Basic protection techniques: steganography, cryptography, digest, X.509 certificates, certification authorities (CA) and public-key infrastructures (PKI). (1 CFU) Authentication techniques (password, challenges, Kerberos) and related hardware devices (token and smart-card). (1 CFU) Network security: the IPsec standard to protect IP networks; security of the network configuration and management protocols; firewall and IDS to create protected subnets; virtual private networks (VPN); security of wireless networks. (1 CFU) Application security: e-mail protection (PGP, S/MIME), web security (SSL, TLS) and remote access protection (SSH, TLS), securing web applications. (1 CFU) Secure document workflow and e-commerce; national and international legislation about IT security; digital signature, electronic documents, GDPR (General Data Protection Regulation), forensic analysis.

Information systems security

Information systems security

Information systems security

The course consists of lectures (36 hours), classroom exercises (9 hours), and laboratory (15 hours). The laboratory includes the development and analysis of several security solutions. There will be 5 different laboratory subjects.. The classroom exercises will analyse some security solutions, including those tested in the laboratory.

Information systems security

The course consists of lectures (36 hours), classroom exercises (9 hours), and laboratory (15 hours). The laboratory includes the development and analysis of several security solutions. There will be 5 different laboratory subjects.. The classroom exercises will analyse some security solutions, including those tested in the laboratory.

Information systems security

Handouts of the instructor’s foils and manuals for laboratory coursework. All learning stuff is available at the instructor’s web site. An auxiliary textbook, covering many but not all the topics, is: - W. Stallings, 'Cryptography and Network Security - principles and practice', Prentice-Hall

Information systems security

Handouts of the instructor’s foils and manuals for laboratory coursework. All learning stuff is available at the instructor’s web site. An auxiliary textbook, covering many but not all the topics, is: - W. Stallings, 'Cryptography and Network Security - principles and practice', Prentice-Hall

Information systems security

Modalità di esame: Elaborato scritto individuale; Prova scritta a risposta aperta o chiusa tramite PC con l'utilizzo della piattaforma di ateneo Exam integrata con strumenti di proctoring (Respondus);

Information systems security

Written test (2 hours) with up to 10 open or closed questions about the analysis and design of security solutions. This test will take place in written form for the students taking the test in a classroom, while the students taking the remote exam will use their own PC to access the Exam platform integrated with the Respondus proctoring tool. The written test is a “closed book” one and the maximum grade is 30/30. Alternatively, the student can develop an individual homework about one of the course's topics, delivering a written report, optionally followed by an oral presentation. The report is evaluated up to 27/30 while the oral presentation is worth up to 3/30, for a total grade up to 30/30.

Information systems security

Exam: Individual essay; Computer-based written test with open-ended questions or multiple-choice questions using the Exam platform and proctoring tools (Respondus);

Information systems security

Written test (2 hours) with up to 10 open or closed questions about the analysis and design of security solutions. This test will take place in written form for the students taking the test in a classroom, while the students taking the remote exam will use their own PC to access the Exam platform integrated with the Respondus proctoring tool. The written test is a “closed book” one and the maximum grade is 30/30. Alternatively, the student can develop an individual homework about one of the course's topics, delivering a written report, optionally followed by an oral presentation. The report is evaluated up to 27/30 while the oral presentation is worth up to 3/30, for a total grade up to 30/30.

Information systems security

Modalità di esame: Test informatizzato in laboratorio; Prova scritta (in aula); Elaborato scritto individuale; Prova scritta a risposta aperta o chiusa tramite PC con l'utilizzo della piattaforma di ateneo Exam integrata con strumenti di proctoring (Respondus);

Information systems security

Written test (2 hours) with up to 10 open or closed questions about the analysis and design of security solutions. This test will take place in written form for the students taking the test in a classroom, while the students taking the remote exam will use their own PC to access the Exam platform integrated with the Respondus proctoring tool. The written test is a “closed book” one and the maximum grade is 30/30. Alternatively, the student can develop an individual homework about one of the course's topics, delivering a written report, optionally followed by an oral presentation. The report is evaluated up to 27/30 while the oral presentation is worth up to 3/30, for a total grade up to 30/30.

Information systems security

Exam: Computer lab-based test; Written test; Individual essay; Computer-based written test with open-ended questions or multiple-choice questions using the Exam platform and proctoring tools (Respondus);

Information systems security

Written test (2 hours) with up to 10 open or closed questions about the analysis and design of security solutions. This test will take place in written form for the students taking the test in a classroom, while the students taking the remote exam will use their own PC to access the Exam platform integrated with the Respondus proctoring tool. The written test is a “closed book” one and the maximum grade is 30/30. Alternatively, the student can develop an individual homework about one of the course's topics, delivering a written report, optionally followed by an oral presentation. The report is evaluated up to 27/30 while the oral presentation is worth up to 3/30, for a total grade up to 30/30.

Esporta Word


© Politecnico di Torino
Corso Duca degli Abruzzi, 24 - 10129 Torino, ITALY
Contatti