First cycle
degree courses
Second cycle
degree courses
Single cycle
degree courses
School of Science
Course unit
SC01123005, A.A. 2015/16

Information concerning the students who enrolled in A.Y. 2015/16

Information on the course unit
Degree course Second cycle degree in
SC1176, Degree course structure A.Y. 2014/15, A.Y. 2015/16
bring this page
with you
Number of ECTS credits allocated 6.0
Type of assessment Mark
Course unit English denomination COMPUTER SECURITY
Website of the academic structure
Department of reference Department of Mathematics
Mandatory attendance No
Language of instruction English
Single Course unit The Course unit can be attended under the option Single Course unit attendance
Optional Course unit The Course unit can be chosen as Optional Course unit

Teacher in charge MAURO CONTI INF/01

ECTS: details
Type Scientific-Disciplinary Sector Credits allocated
Core courses INF/01 Computer Science 6.0

Course unit organization
Period Second semester
Year 1st Year
Teaching method frontal

Type of hours Credits Teaching
Hours of
Individual study
Lecture 6.0 40 110.0 No turn

Start of activities 01/03/2016
End of activities 15/06/2016
Show course schedule 2019/20 Reg.2014 course timetable

Examination board
Examination board not defined

Prerequisites: Basic knowledge of distributed systems, cryptography and network security.
Target skills and knowledge: To acquire knowledge of system security for Linux and Windows, security of wireless and wired networks, web-application security, and security management.
At the end of the course, the students will be able to design the architecture of secure systems and applications, and individually update their knowledge in the field.
Examination methods: Written.
Assessment criteria: Knowledge of the concepts studied during the course.
Course unit contents: 1) COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES: Cryptographic Tools, User Authentication, Access Control, Database Security, Malicious Software, Denial-of-Service Attacks, Intrusion Detection, Firewalls and Intrusion Prevention Systems.
2) SOFTWARE SECURITY AND TRUSTED SYSTEMS: Buffer Overflow, Software Security, Operating System Security, Trusted Computing and Multilevel Security.
3) MANAGEMENT ISSUES: IT Security Management and Risk Assessment, IT Security Controls, Plans, and Procedures, Physical and Infrastructure Security, Human Resources Security, Security Auditing, Legal and Ethical Aspects.
4) PART FOUR CRYPTOGRAPHIC ALGORITHMS: Symmetric Encryption and Message Confidentiality, Public-Key Cryptography and Message Authentication.
5) NETWORK SECURITY: Internet Security Protocols and Standards, Internet Authentication Applications, Wireless Network Security.
Planned learning activities and teaching methods: Lectures, discussion of scientific papers.
Additional notes about suggested reading: Book (main book: Computer Security: Principles and Practice 2/E) and scientific papers.

The course will be given in English.
The web site of the course will offer all the information and additional material:
Textbooks (and optional supplementary readings)
  • W. Stallings, L. Brown, Computer Security: Principles and Practice 2/E. --: Prentice Hall, 2011. Cerca nel catalogo
  • M. Bishop, Introduction to Computer Security. --: Addison-Wesley Professional, 2004. Cerca nel catalogo