|
Course unit
INFORMATION SECURITY
INP7080701, A.A. 2018/19
Information concerning the students who enrolled in A.Y. 2018/19
ECTS: details
Type |
Scientific-Disciplinary Sector |
Credits allocated |
Core courses |
ING-INF/03 |
Telecommunications |
6.0 |
Course unit organization
Period |
First semester |
Year |
1st Year |
Teaching method |
frontal |
Type of hours |
Credits |
Teaching hours |
Hours of Individual study |
Shifts |
Laboratory |
1.0 |
8 |
17.0 |
2 |
Lecture |
5.0 |
40 |
85.0 |
No turn |
Start of activities |
01/10/2018 |
End of activities |
18/01/2019 |
Examination board
Board |
From |
To |
Members of the board |
2 A.A. 2018/2019 |
01/10/2018 |
15/03/2020 |
LAURENTI
NICOLA
(Presidente)
POLTRONIERI
ANNA
(Membro Effettivo)
BADIA
LEONARDO
(Supplente)
CALVAGNO
GIANCARLO
(Supplente)
CORVAJA
ROBERTO
(Supplente)
ERSEGHE
TOMASO
(Supplente)
MILANI
SIMONE
(Supplente)
ROSSI
MICHELE
(Supplente)
TOMASIN
STEFANO
(Supplente)
VANGELISTA
LORENZO
(Supplente)
ZANELLA
ANDREA
(Supplente)
ZANUTTIGH
PIETRO
(Supplente)
ZORZI
MICHELE
(Supplente)
|
1 A.A. 2017/2018 |
01/10/2017 |
15/03/2019 |
LAURENTI
NICOLA
(Presidente)
TOMASIN
STEFANO
(Membro Effettivo)
BADIA
LEONARDO
(Supplente)
BENVENUTO
NEVIO
(Supplente)
CALVAGNO
GIANCARLO
(Supplente)
CORVAJA
ROBERTO
(Supplente)
ERSEGHE
TOMASO
(Supplente)
MILANI
SIMONE
(Supplente)
ROSSI
MICHELE
(Supplente)
VANGELISTA
LORENZO
(Supplente)
ZANELLA
ANDREA
(Supplente)
ZANUTTIGH
PIETRO
(Supplente)
ZORZI
MICHELE
(Supplente)
|
Prerequisites:
|
The class requires previous basic knowledge in:
1. communication or computer networks.
2. digital communications
3. algorithms and computational complexity
4. statistics, probability and information theory |
Target skills and knowledge:
|
The class aims at introducing the students to the fundamental notions and tools in information security, with a focus on the solutions, attacks and countermeasures that can be deployed at the different layers in modern communication networks.
It is expected that the students shall learn:
1. To take awareness of how critical it is to protect information assets in an adversarial context.
2. Security goals and services, as well as distinguish how they can be provided by different protection mechanisms.
3. Computational and unconditional security mechanisms for several services at the different layers of a communication network.
Moreover it is expected that the students shall be able to:
1. Recognize threats and vulnerabilities in a communication system/network instance.
2. Identify the required security goals and services in a specific context, as well as how they can be provided by different protection mechanisms.
3. Evaluate the level of security of mechanisms and protocols, even quantitatively.
4. Properly choose the parameters of a security mechanism (e.g., key size, number of protocol rounds) according to the required security level. |
Examination methods:
|
The exam is split into two parts:
1. An individual essay on a specific topic (e.g., a literature review).
2. A traditional type oral exam on the course topics
The student must first submit his essay, for evaluation by the instructor. If approved, the student is admitted to the oral exam after which he will obtain his final grade. |
Assessment criteria:
|
The exam aims at assessing to what extent the students has acquired
1. a solid understanding of fundamental security notions
2. the ability to apply general models to particular instances of algorithms and protocols
3. critical thinking in the evaluation and comparison of different
mechanisms. |
Course unit contents:
|
1. Basic security notions and definitions.
2. Quantitative definitions and assessment of security level.
3. Cryptographic and non cryptographic security mechanisms.
4. Network security protocols at different layers.
5. Further security issues for wireless, ad hoc and mobile networks. |
Planned learning activities and teaching methods:
|
Lectures and laboratory sessions.
Small group discussions and interactive lectures. |
Additional notes about suggested reading:
|
Additional material and references to the scientific and technical
literature will be available on the class Moodle page. |
Textbooks (and optional supplementary readings) |
-
William Stallings, Cryptography and Network Security. Principles and Practice.. --: Englewood Cliffs: Prentice Hall,, 2014. 6th ed., ISBN 9780273793359
|
Innovative teaching methods: Teaching and learning strategies
- Lecturing
- Laboratory
- Interactive lecturing
- Working in group
- Questioning
- Video shooting made by the teacher/the students
- Loading of files and pages (web pages, Moodle, ...)
Innovative teaching methods: Software or applications used
- Moodle (files, quizzes, workshops, ...)
- One Note (digital ink)
- Latex
- Matlab
- online classroom feedback systems (preferred one is Letsfeedback.com)
Sustainable Development Goals (SDGs)
|
|