Protezione e Sicurezza nei Sistemi Operativi
Data | Argomento | Slides |
---|---|---|
03/04 | Introduction, Changing face of attackers, Economic impacts, Security terminology, Security in context, Network Information Systems, Trustworthiness, Real world security, Zero-day attacks, Security Policies, Assurance versus functionality, Security design principles | intro.pdf |
10/04 | Introduction to cryptography, Terminology, Symmetric and asymmetric cryptography, Steganography, Substitution ciphers, Permutation ciphers, Rotor engines, Enigma, One-time-pad, Digital Encryption Standard (DES), Public-key cryptography, the RSA algorithm, Correctness and security of RSA, Efficiency of RSA, Primality testing, Generating large primes | critto.pdf DES.pdf RSA.pdf |
24/04 | Authentication, Digest algorithms, Digital signatures, Message Authentication Codes, Key Management, Kerberos, Certificates, Public-Key Infrastructures, Secret sharing, Key Escrow, Secure Sockets Layer, | auth.pdf keys.pdf PKI.pdf escrow.pdf SSL.pdf |
15/05 | User Authentication: Passwords, Dictionary Attack, Spoofing, Keyloggers, One-time passwords, Biometrics, Cryptographic Techniques, S/Key, 2-factor verification, Access Control: Access Control Lists, Capabilities, Unix example, Denial-of-Service, Distributed Denial-of-Service, Defenses | passwd.pdf c-auth.pdf access.pdf DoS.pdf |