NETWORK SECURITY
cod. 1002538

Academic year 2012/13
1° year of course - Second semester
Professor
Academic discipline
Telecomunicazioni (ING-INF/03)
Field
Attività formative affini o integrative
Type of training activity
Related/supplementary
63 hours
of face-to-face activities
9 credits
hub:
course unit
in - - -

Learning objectives

The objective of this course is the study of the main security mechanisms and protocols used for securing communications and for protecting computer networks, to provide basic knowledge of applied cryptograhpy, and to study in depth the main algorithms and protocols for authentication, communication security and network protection.

Prerequisites

Familiarity with TCP/IP stack and networking.

Course unit content

Cryptography basics and algorithms, authentication mechanisms and digital signature;
Protocols for secure communications;
Main network threats, vulnerabilities, and countermeasures;
Systems for network protections.

Full programme

1) Basics of cryptography and authentication mechanisms
Basics of symmetric (classic) cryptography and examples of algorithms (DES, 3DES, AES)
Basics of asymmetric cryptography and examples of algorithms(RSA, Diffie-Hellman, DSA); advantages and disadvantages
Hash and MAC functions (MD5, SHA, HMAC)
Authentication algorithms, based on both symmetric and asymmetric cryptography
Key exchange, agreement, distribution
Digital signature, digital certificates, certification authority, Public Key Infrastructure, standard X.509, PGP (Pretty Good Privacy)

2) Security protocols
Protocols for authentication and key exchange (Kerberos, AAA, RADIUS)
Protocols for secure communications at IP layer (IPSec/AH/ESP), and virtual private networks (VPNs)
Protocols for secure communications at transport (SSL/TLS) and application layer

3) Network vulnerabilities and countermeasures
Vulnerabilities of TCP/IP protocols, attacks and countermeasures (sniffing, network and port scanning, spoofing, flooding, buffer overflow, etc.)
Firewall (packet filtering, ALG, NAT, DMZ), examples of network configurations
Protocols for FW and NAT traversal (STUN e TURN)
Intrusion Detection System (IDS)
Anonymity networks

Bibliography

[1] L. Veltri, "Network Security", slides of the course, http://www.tlc.unipr.it/veltri
[2] W. Stallings, "Cryptography and Network Security: Principles and Practice", Prentice Hall

Teaching methods

Class lessons and exercises. Laboratoy acitvities.

Assessment methods and criteria

Two written examinations, at the middle and the end of the course, that complete the exam. Alternatively the exam can be succeeded during regular scheduled examinations. In both cases, the exam is written and composed of multiple choice questions, open answer questions, and some exercises.

Other information

- - -