Politecnico di Torino
Politecnico di Torino
Politecnico di Torino
Academic Year 2015/16
Computer systems security
Master of science-level of the Bologna process in Computer Engineering - Torino
Teacher Status SSD Les Ex Lab Years teaching
Lioy Antonio ORARIO RICEVIMENTO PO ING-INF/05 40 5 15 16
SSD CFU Activities Area context
ING-INF/05 6 C - Affini o integrative Attivitą formative affini o integrative
Subject fundamentals
The course is taught in Italian.
This is a compulsory course for the Laurea Magistrale in Computer Engineering, given at the I semester of the II year. This course deals with security issues in modern networked computer systems, paying special attention to data security and protection of computer networks and networked computer applications, in a closed (Intranet) or open (Internet) environment. The course aims to teach the skills needed to perform both the analysis and design of the security features of a networked computer system.
Expected learning outcomes
- Knowledge of the main categories of attack against networked computer systems
- Knowledge and critical evaluation of the main methodologies (encrypyion and digest) and technologies (PKI, firewall, VPN, TLS, S/MIME, e-documents) for computer and information security
- Knowledge and critical evaluation of the security architectures for authentication and access control and ability to tailor them to the protection of networked computer systems
- Ability to analyse the risks of a network application and design a solution for its protection
Prerequisites / Assumed knowledge
Ethernet local area networks. Wireless networks. TCP/IP networks and applications. High-level programming (in C, C++ or Java). Operating systems.
- (1 CFU) Computer systems (in)security: problems and attacks (sniffing, spoofing, DOS, ').
- (1 CFU) Basic protection techniques: steganography, cryptography, digest, X.509 certificates, certification authorities (CA) and public-key infrastructures (PKI).
- (1 CFU) Authentication techniques (password, challenge-response, Kerberos) and related hardware devices (token and smart-card).
- (1 CFU) Network security: the IPsec standard for protection of IP networks; security of the protocols for configuration and management of IP networks; use of firewall and IDS for creating shielded sub-networks; virtual private networks (VPN); security of wireless networks.
- (1 CFU) Application security: e-mail protection (PGP, S/MIME), web security (SSL, TLS); remote access protection (SSH, SSL, TLS), security in the development of web-based applications.
- (1 CFU) Secure document workflow and e-commerce; national and international legislation about e-documents; electronic signature and e-documents; the SET protocol and other techniques for protecting-commerce.
Delivery modes
The experimental lab proposes the creation and analysis of various security solutions. About 6-7 different labs are planned, that can be repeated.
Exercises proposed in the classroom will deal with the analysis of various security architectures, including those developed during the experimental lab.
Texts, readings, handouts and other learning resources
The reference textbook (covering most but not all the topics) is:
- W. Stallings, 'Cryptography and Network Security ' principles and practice', Prentice-Hall (5th ed.)
Additionally the lessons' handouts and the laboratory manuals are available at the web site of the course.
Assessment and grading criteria
Written exam (2 hours) about the analysis and design of various security solutions. Alternatively, the student may opt for a homework (among those suggested by the instructor) related to one of the course's topics.

Programma definitivo per l'A.A.2015/16

© Politecnico di Torino
Corso Duca degli Abruzzi, 24 - 10129 Torino, ITALY
WCAG 2.0 (Level AA)