Protezione e Sicurezza nei Sistemi Operativi


Data Argomento Slides
03/04 Introduction, Changing face of attackers, Economic impacts, Security terminology, Security in context, Network Information Systems, Trustworthiness, Real world security, Zero-day attacks, Security Policies, Assurance versus functionality, Security design principles intro.pdf
10/04 Introduction to cryptography, Terminology, Symmetric and asymmetric cryptography, Steganography, Substitution ciphers, Permutation ciphers, Rotor engines, Enigma, One-time-pad, Digital Encryption Standard (DES), Public-key cryptography, the RSA algorithm, Correctness and security of RSA, Efficiency of RSA, Primality testing, Generating large primes critto.pdf
DES.pdf
RSA.pdf
24/04 Authentication, Digest algorithms, Digital signatures, Message Authentication Codes, Key Management, Kerberos, Certificates, Public-Key Infrastructures, Secret sharing, Key Escrow, Secure Sockets Layer,  auth.pdf
keys.pdf
PKI.pdf
escrow.pdf
SSL.pdf
15/05 User Authentication: Passwords, Dictionary Attack, Spoofing, Keyloggers, One-time passwords, Biometrics, Cryptographic Techniques, S/Key, 2-factor verification, Access Control: Access Control Lists, Capabilities, Unix example, Denial-of-Service, Distributed Denial-of-Service, Defenses passwd.pdf
c-auth.pdf
access.pdf
DoS.pdf