First cycle
degree courses
Second cycle
degree courses
Single cycle
degree courses
Faculty of Engineering
TELECOMMUNICATION ENGINEERING
Course unit
NETWORK SECURITY
INN1027837, A.A. 2013/14

Information concerning the students who enrolled in A.Y. 2012/13

Information on the course unit
Degree course Second cycle degree in
TELECOMMUNICATION ENGINEERING
IN0524, Degree course structure A.Y. 2008/09, A.Y. 2013/14
N0
bring this page
with you
Number of ECTS credits allocated 6.0
Type of assessment Mark
Course unit English denomination NETWORK SECURITY
Department of reference Department of Information Engineering
Mandatory attendance No
Language of instruction English
Branch PADOVA
Single Course unit The Course unit CANNOT be attended under the option Single Course unit attendance
Optional Course unit The Course unit can be chosen as Optional Course unit

Lecturers
Teacher in charge NICOLA LAURENTI ING-INF/03

Mutuated
Course unit code Course unit name Teacher in charge Degree course code
INN1027837 NETWORK SECURITY NICOLA LAURENTI IN0521

ECTS: details
Type Scientific-Disciplinary Sector Credits allocated
Core courses ING-INF/03 Telecommunications 6.0

Course unit organization
Period Second semester
Year 2nd Year
Teaching method frontal

Type of hours Credits Teaching
hours
Hours of
Individual study
Shifts
Lecture 6.0 48 102.0 No turn

Calendar
Start of activities 03/03/2014
End of activities 14/06/2014
Show course schedule 2017/18 Reg.2008 course timetable

Examination board
Board From To Members of the board
5 AA. 2015/2016 01/10/2015 15/03/2017 LAURENTI NICOLA (Presidente)
BADIA LEONARDO (Supplente)
CORVAJA ROBERTO (Supplente)
ERSEGHE TOMASO (Supplente)
ROSSI MICHELE (Supplente)
TOMASIN STEFANO (Supplente)
VANGELISTA LORENZO (Supplente)
ZANELLA ANDREA (Supplente)
4 AA. 2014/2015 01/10/2014 15/03/2016 LAURENTI NICOLA (Presidente)
CORVAJA ROBERTO (Membro Effettivo)
BADIA LEONARDO (Supplente)
BENVENUTO NEVIO (Supplente)
CALVAGNO GIANCARLO (Supplente)
PUPOLIN SILVANO (Supplente)
TOMASIN STEFANO (Supplente)
VANGELISTA LORENZO (Supplente)
ZANELLA ANDREA (Supplente)
ZANUTTIGH PIETRO (Supplente)
ZORZI MICHELE (Supplente)
01/10/2013 15/03/2015 LAURENTI NICOLA (Presidente)
CORVAJA ROBERTO (Membro Effettivo)
BADIA LEONARDO (Supplente)
BENVENUTO NEVIO (Supplente)
CORTELAZZO GUIDO MARIA (Supplente)
ERSEGHE TOMASO (Supplente)
PUPOLIN SILVANO (Supplente)
ROSSI MICHELE (Supplente)
TOMASIN STEFANO (Supplente)
VANGELISTA LORENZO (Supplente)
ZANELLA ANDREA (Supplente)
ZORZI MICHELE (Supplente)
2 2012 01/10/2012 15/03/2014 LAURENTI NICOLA (Presidente)
CORVAJA ROBERTO (Membro Effettivo)
BADIA LEONARDO (Supplente)
BENVENUTO NEVIO (Supplente)
CALVAGNO GIANCARLO (Supplente)
CARIOLARO GIANFRANCO (Supplente)
CORTELAZZO GUIDO MARIA (Supplente)
ERSEGHE TOMASO (Supplente)
PIEROBON GIANFRANCO (Supplente)
PUPOLIN SILVANO (Supplente)
ROSSI MICHELE (Supplente)
TOMASIN STEFANO (Supplente)
VANGELISTA LORENZO (Supplente)
ZANELLA ANDREA (Supplente)
ZANUTTIGH PIETRO (Supplente)
ZORZI MICHELE (Supplente)

Syllabus
Prerequisites: A basic class on communication or computer networks
Target skills and knowledge: In modern computer communication systems, securing against malicious behaviour has become a primary issue, that must be part of the design since its earliest phases, rather than a patch added as a belated measure.

The class aims at introducing the students to the fundamental notions and tools in information security, with a focus on the solutions, attacks and countermeasures that can be deployed at the different layers in modern communication networks.
Examination methods: The student must first either undertake a team lab exercise or submit an individual literature review essay. Then, he must take an oral exam to obtain his final grade.
Assessment criteria: The exam aims at assessing the students'
- deep understanding of fundamental security notions
- ability to adapt general models to particular instances of algorithms and protocols
- critical thinking in the evaluation and comparison of different mechanisms
Course unit contents: Basic security notions and definitions.
Unconditional vs computational security.
Cryptographic and non cryptographic security mechanisms.
Network security protocols at different layers.
Further security issues for wireless, ad hoc and mobile networks.
Planned learning activities and teaching methods: Lectures and optional laboratory sessions
Additional notes about suggested reading: Additional material and literature references will be available on the class Moodle page
Textbooks (and optional supplementary readings)
  • William Stallings, Cryptography and Network Security. Principles and Practice. Englewood Cliffs: Prentice Hall, 2011. 5th ed., ISBN 9780137056323 Cerca nel catalogo