Servizi per la didattica
PORTALE DELLA DIDATTICA

Computer system security

02KRQOV, 02KRQBG

A.A. 2018/19

Course Language

English

Course degree

Master of science-level of the Bologna process in Computer Engineering - Torino
Master of science-level of the Bologna process in Communications And Computer Networks Engineering - Torino

Course structure
Teaching Hours
Lezioni 39
Esercitazioni in aula 6
Esercitazioni in laboratorio 15
Teachers
Teacher Status SSD h.Les h.Ex h.Lab h.Tut Years teaching
Lioy Antonio Professore Ordinario ING-INF/05 30 0 0 0 13
Teaching assistant
Espandi

Context
SSD CFU Activities Area context
ING-INF/05 6 C - Affini o integrative Attività formative affini o integrative
2018/19
This course is taught in English. This is a compulsory course for the Laurea Magistrale in Computer Engineering, given at the I semester of the II year. This course deals with security issues in modern networked computer systems, paying special attention to data security and protection of computer networks and networked computer applications, in a closed (Intranet) or open (Internet) environment. The course aims to teach the skills needed to perform both the analysis and design of the security features of a networked computer system.
This course is taught in English. This is a compulsory course for the Laurea Magistrale in Computer Engineering, given at the I semester of the II year. This course deals with security issues in modern networked computer systems, paying special attention to data security and protection of computer networks and networked computer applications, in a closed (Intranet) or open (Internet) environment. The course aims to teach the skills needed to perform both the analysis and design of the security features of a networked computer system.
Knowledge of the main categories of attack against networked computer systems. Knowledge and critical evaluation of the main methodologies (encrypyion and digest) and technologies (PKI, firewall, VPN, TLS, S/MIME, e-documents) for computer and information security. Knowledge and critical evaluation of the security architectures for authentication and access control and ability to tailor them to the protection of networked computer systems. Ability to analyse the risks of a network application and design a solution for its protection.
Knowledge of the main categories of attack against networked computer systems. Knowledge and critical evaluation of the main methodologies (encrypyion and digest) and technologies (PKI, firewall, VPN, TLS, S/MIME, e-documents) for computer and information security. Knowledge and critical evaluation of the security architectures for authentication and access control and ability to tailor them to the protection of networked computer systems. Ability to analyse the risks of a network application and design a solution for its protection.
Foundations of telecommunication systems. Local and wide area networks. Wired and wireless (Ethernet, ADSL, WiFI, GSM, IP, routing, ...). TCP/IP networks and applications. High-level programming (C, C++ o Java). Operating systems and database.
Foundations of telecommunication systems. Local and wide area networks. Wired and wireless (Ethernet, ADSL, WiFI, GSM, IP, routing, ...). TCP/IP networks and applications. High-level programming (C, C++ o Java). Operating systems and database.
(1 CFU) Computer systems (in)security: problems and attacks (sniffing, spoofing, DOS, …). (1 CFU) Basic protection techniques: steganography, cryptography, digest, X.509 certificates, certification authorities (CA) and public-key infrastructures (PKI). (1 CFU) Authentication techniques (password, challenges, Kerberos) and related hardware devices (token and smart-card). (1 CFU) Network security: the IPsec standard to protect IP networks; security of the network configuration and management protocols; firewall and IDS to create protected subnets; virtual private networks (VPN); security of wireless networks. (1 CFU) Application security: e-mail protection (PGP, S/MIME), web security (SSL, TLS) and remote access protection (SSH, SSL, TLS), securing web applications. (1 CFU) Secure document workflow and e-commerce; national and international legislation about e documents; digital signature and e documents; the SET protocol and other e-payment systems.
(1 CFU) Computer systems (in)security: problems and attacks (sniffing, spoofing, DOS, …). (1 CFU) Basic protection techniques: steganography, cryptography, digest, X.509 certificates, certification authorities (CA) and public-key infrastructures (PKI). (1 CFU) Authentication techniques (password, challenges, Kerberos) and related hardware devices (token and smart-card). (1 CFU) Network security: the IPsec standard to protect IP networks; security of the network configuration and management protocols; firewall and IDS to create protected subnets; virtual private networks (VPN); security of wireless networks. (1 CFU) Application security: e-mail protection (PGP, S/MIME), web security (SSL, TLS) and remote access protection (SSH, SSL, TLS), securing web applications. (1 CFU) Secure document workflow and e-commerce; national and international legislation about e documents; digital signature and e documents; the SET protocol and other e-payment systems.
The laboratory includes the development and analysis of several security solutions. There will be 5 different labs. The classroom exercises will analyse some security solutions, including those developed in the labs.
The laboratory includes the development and analysis of several security solutions. There will be 5 different labs. The classroom exercises will analyse some security solutions, including those developed in the labs.
Handouts of the instructor’s foils and manuals for laboratory coursework. All learning stuff is available at the instructor’s web site.
Handouts of the instructor’s foils and manuals for laboratory coursework. All learning stuff is available at the instructor’s web site.
Modalità di esame: prova scritta; elaborato scritto individuale;
Written test (2 hours) with up to 10 open questions about the analysis and design of security solutions. The written test is a “closed book” one and the maximum grade is 30/30. Alternatively, the student can develop an individual homework about one of the course's topics, delivering a written report, optionally followed by an oral presentation. The report is evaluated up to 27/30 while the oral presentation is worth up to 3/30, for a total grade up to 30/30.
Exam: written test; individual essay;
Written test (2 hours) with up to 10 open questions about the analysis and design of security solutions. The written test is a “closed book” one and the maximum grade is 30/30. Alternatively, the student can develop an individual homework about one of the course's topics, delivering a written report, optionally followed by an oral presentation. The report is evaluated up to 27/30 while the oral presentation is worth up to 3/30, for a total grade up to 30/30.


© Politecnico di Torino
Corso Duca degli Abruzzi, 24 - 10129 Torino, ITALY
m@il