20650 - CYBER SECURITY TECHNOLOGIES, PROCEDURES AND POLICIES
Cross-institutional study L. Bocconi - Politecnico Milano
STEFANO ZANERO
Suggested background knowledge
PREREQUISITES
Mission & Content Summary
MISSION
CONTENT SUMMARY
1) Introduction to information security
- What is information security: examples
- Vulnerabilities, Risks, Exploits, Attackers: definitions
- Security as risk management
2) A short introduction to cryptography
- Basic concepts: cypher, transposition, substitution
- Symmetric and asymmetric ciphers
- Hash functions, digital signatures and PKI
- Vulnerabilities in digital signature schemes and in PKI
- Why all of the above is almost useless as a security defense
3) Authentication
- The three ways of authentication
- Multifactor authentication
- Authentication technologies evaluation; bypassing authentication control
4) Authorization and access control
- Discretionary (DAC) and mandatory (MAC) access control policies
- Multilevel security and its applications: military secrets management
5) Software vulnerabilities
- Design, implementation and configuration bugs
- The vulnerability lifecycle. Zero-days. Disclosure. The vulnerability market.
6) Secure networking architectures
- Network protocol attacks: sniffing, denial of service, spoofing, DNS poisoning, ARP poisoning
- Firewall: taxonomy and technologies
- Secure network architectures (DMZ and multi-zone networks)
- Virtual private networks (VPN)
- Secure connections and transactions: the tale of SSL and SET and their weaknesses
7) Malicious software
- The evolution of malicious software: from the Morris worms to modern malware
- Mobile malware: the case of malicious Android apps
- Botnets and underground economy
- Malware analysis and honeypots
Intended Learning Outcomes (ILO)
KNOWLEDGE AND UNDERSTANDING
students will know the basic terminology of security and a rudimentary risk assessment methodology. They will have a broad knowledge of basic security technologies and of their fallacies
and issues.
APPLYING KNOWLEDGE AND UNDERSTANDING
tudents will have developed the skills needed to assess the basic security issues of systems and processes. They will be able to discuss security choices in meaningful terms, to evaluate a provided
solution and improve over it, or to offer and sketch a solution to a security problem provided.
Teaching methods
- Lectures
- Practical Exercises
- Interaction/Gamification
DETAILS
DIDATTICA TRASMISSIVA/FRONTALE DIDATTICA INTERATTIVA/PARTECIPATIVA DIDATTICA VALUTATIVA DIDATTICA LABORATORIALE DIDATTICA PROGETTUALE
Assessment methods
Continuous assessment | Partial exams | General exam | |
---|---|---|---|
|
x | ||
|
x |
ATTENDING AND NOT ATTENDING STUDENTS
The course is evaluated partly based on class participation and discussions, and partly based on an oral exam.
Teaching materials
ATTENDING AND NOT ATTENDING STUDENTS
Dieter Gollmann, Computer Security - 3rd edition, Editore: Wiley, Anno edizione: 2011, ISBN: 978-0-470-74115-3 It is vital that you get the 3rd edition if you choose this book!
Ross Anderson, Security Engineering, Editore: Wiley, ISBN: 0-471-38922-6 http://www.cl.cam.ac.uk/~rja14/book.html