Data Argomento Slides
03/03 Introduction, Changing face of attackers, Economic impacts, Security terminology intro.pdf
04/03 Security in context, Network Information Systems, Trustworthiness, Real world security
05/03 Zero-day attacks, Security Policies, Assurance versus functionality, Security design principles

10/03 Introduction to cryptography, Terminology, Symmetric and asymmetric cryptography critto-intro.pdf
11/03 Steganography, Substitution ciphers, Permutation ciphers, Rotor engines, Enigma
critto-storico-DES.pdf
12/03 One-time-pad, Digital Encryption Standard (DES)

17/03
Lauree

18/03
Lauree

19/03
Lauree

24/03 Public-key cryptography, the RSA algorithm, Correctness and security of RSA critto-RSA.pdf
25/03 Efficiency of RSA, Primality testing, Generating large primes
26/03 Authentication, Digest algorithms, Digital signatures, Message Authentication Codes critto-auth.pdf
31/03 Laboratorio: Introduzione e Esercitazione 1
01/04 Key Management, Kerberos critto-key-manage.pdf
02/04 Certificates, Public-Key Infrastructures critto-PKI.pdf
07/04 Secret sharing, Key Escrow critto-key-escrow.pdf
08/04
PGP: Pretty Good Privacy critto-PGP.pdf
09/04
Pasqua

14/04
Pasqua

15/04 SSL: Secure Sockets Layer SSL.pdf
16/04 Laboratorio: Esercitazione 2
21/04 User Authentication: Passwords, Dictionary Attack, Spoofing, Keyloggers, One-time passwords passwd.pdf
22/04
User Authentication: Biometrics, Cryptographic Techniques, S/Key, 2-factor verification critto-user-auth.pdf
23/04 Laboratorio: Esercitazione 3
28/04 Access Control: Access Control Lists, Capabilities, Unix example access-control.pdf
29/04 Internet Security: Firewalls firewall.pdf
30/04 Laboratorio: Esercitazione 4
05/05 Internet Security: IPSec IPSec.pdf
06/05 Internet Security: Denial-of-Service, Distributed Denial-of-Service, Defenses DoS.pdf
07/05 Laboratorio: Esercitazione 5
12/05 Internet Security: Cloud, IoT and Wireless Security Cloud-IoT-Wireless.pdf
13/05 Intrusion Detection Systems, Cyber Forensics IDS.pdf
14/05 Words of Wisdom from Bruce Schneier Schneier.pdf