Data | Argomento | Slides |
---|---|---|
21/02 | Introduction, Changing face of attackers, Economic impacts, Security terminology | intro.pdf |
23/02 | Security in context, Network Information Systems, Trustworthiness, Real world security | |
25/02 | Zero-day attacks, Security Policies, Assurance versus
functionality, Security design principles |
|
28/02 | Introduction to cryptography, Terminology, Symmetric and asymmetric cryptography | critto-intro.pdf |
02/03 | Steganography, Substitution ciphers, Permutation ciphers,
Rotor engines,
Enigma |
critto-storico-DES.pdf |
04/03 | One-time-pad, Digital Encryption Standard (DES) |
|
07/03 | Public-key cryptography, the RSA algorithm, Correctness and security of RSA | critto-RSA.pdf |
09/03 | Laboratorio: Introduzione e Esercitazione 1 | lab-intro.pdf Esercitazione 1 |
11/03 | Efficiency of RSA, Primality testing, Generating large primes | |
14/03 | Authentication, Digest algorithms, Digital signatures, Message Authentication Codes | critto-auth.pdf |
16/03 |
Lauree |
|
18/03 | Key Management, Kerberos | critto-key-manage.pdf |
21/03 | Laboratorio: Esercitazione 2 | Esercitazione 2 |
23/03 | Certificates, Public-Key Infrastructures | critto-PKI.pdf |
25/03 | Secret sharing, Key Escrow | critto-key-escrow.pdf |
28/03 |
PGP: Pretty Good Privacy | critto-PGP.pdf |
30/03 | SSL: Secure Sockets Layer | SSL.pdf |
01/04 | Laboratorio: Esercitazione 3 | Esercitazione 3 |
04/04 | User Authentication: Passwords, Dictionary Attack, Spoofing, Keyloggers, One-time passwords | passwd.pdf |
06/04 |
User Authentication: Biometrics, Cryptographic Techniques, S/Key, 2-factor verification | critto-user-auth.pdf |
08/04 | Laboratorio:
Esercitazione 4 |
Esercitazione 4
|
11/04 |
Lezione
annullato |
|
13/04 |
Lezione
annullato |
|
15/04 |
Pasqua |
|
18/04 |
Pasqua |
|
20/04 | Access Control: Access Control Lists, Capabilities, Unix example | access-control.pdf |
22/04 | Internet Security: Firewalls | firewall.pdf |
25/04 |
25
Aprile |
|
27/04 | Internet Security: IPSec | IPSec.pdf |
29/04 | Laboratorio: Esercitazione 5 | Esercitazione 5
|
02/05 | Internet Security: Denial-of-Service, Distributed Denial-of-Service, Defenses (Rilevazione opinioni studenti) | DoS.pdf |
04/05 | Internet Security: Cloud, IoT and Wireless Security | Cloud-IoT-Wireless.pdf |
06/05 | Intrusion Detection Systems, Cyber Forensics | IDS.pdf |
09/05 | Words of Wisdom from Bruce Schneier | Schneier.pdf |