Modules | Area | Type | Hours | Teacher(s) | |
SICUREZZA DELLE RETI | INF/01 | LEZIONI | 72 |
|
Discover vulnerabilities of ICT system Discover the elementary attacks enabled by these vulnerabilities Run a Penetration Test Evaluate and Manage the risk of ICT system Design and deploy countermeasures to manage the risk
The student will be assessed on his/her demonstrated ability to discuss the main course contents using the appropriate terminology. - During the oral exam the student must be able to demonstrate his/her knowledge of the course material and be able to discuss the reading matter thoughtfully and with propriety of expression.
Methods:
Further information:
The student can select as a final exam either a seminar or some project work. In the latter case, several students may be involved in the projects
Delivery: face to face
Attendance: Advised
Learning activities:
Teaching methods:
The basic notions to evaluate and improve the security of any ICT system: Threat, threat model, vulnerability, attack, complex attack, countermeasure, risk, risk assessment Resiliency, robustness, cost effectiveness Differences between safety and reliability. Peculiarities of security of ICT systems Cloud Computing: definition and enabling technologies Security Problems of Cloud Computing Challenging Security Issues in Cloud Computing
Security Engineering by Ross Anderson is a recommended but not mandatory reading.