WEB SISTEM SECURITY
Knowledge and understanding: The student is required to know and understand the security issues affecting computer networks, communication protocols and any infrastructure whose operation relies on Information Technologies. Applying knowledge and understanding: The student is required to have the capability of performing the security analysis of an information system, identifying the possible vulnerabilities, developing prevention and detection measures against cyber-attacks, and implementing countermeasures to mitigate attack effects. Making judgements: The student is required to be able to autonomously analyse process and techniques for assessing the risk level of an information system, improving security awareness, simulating attack scenarios, and adopting adequate protection measures. Communication skills: The student is required to have the capability of clearly explaining cybersecurity technical concepts and scientific topics. Learning skills: The student has to be capable of integrating the knowledge from several and different sources, such as books, papers, technical reports, conference proceedings) in order to fully understand both basic and specific concepts in the field of information security and therefore to acquire the necessary skill to participate in courses, seminars, and Masters on cybersecurity.
The knowledge of notions and concepts of computer networks, particularly the details of the network and transport level protocols of ISO/OSI model, is required.
Risk management (ISO/IEC 27005 risk management standard);
Sniffing, scanning, fingerprinting techniques;
Attack taxonomy: Remote to Local, User to Root, Spoofing, ARP Poisoning, Distributed Denial of Service, Low-rate attacks, Session Hijacking, Man In The Middle, Malware, Botnets, SQL Injection, Attacks to web applications, Cross Site Scripting, Man in the Browser;
Intrusion Detection Systems;
Security Information and Event Management;
Basics of Cryptography;
Symmetric cryptography algorithms;
Asymmetric cryptography algorithms;
SCADA (Supervisory Control And Data Acquisition) security.
The course addresses the following topics: tools for vulnerability identification and assessment, classes of cyber-attacks, cyber-risk management, risk assessment methodologies, intrusion prevention systems, configuration of firewalls, intrusion detection systems, SIEM (Security Information and Event Management) systems, cryptography, simmetric key encryption algorithms, asimmmetric key encryption algorithms, IPSec, SSH.
Textbook: CRYPTOGRAPHY AND NETWORK SECURITY, SIXTH EDITION, W.Stallings
Discussion of a project work, oral exam.
The goal of the exam is to verify the level of achievement of the course objectives.
The exam is composed of two parts, that take place the same day.
The first part is focused on the discussion of the project work prepared by the student on a topic provided by the teacher. The discussion aims at assessing whether the student is able to analyse an information system, identify possible vulnerabilities and develop methods and techniques to protect it from cyber-threats. In case the student demonstrates during the discussion his/her capability of understanding the addressed security issues and identifying solutions, then he/she can access the second step, that is the oral exam. During the oral exam the capability of the student to link and compare the different aspects and topics addressed in the framework of the course is evaluated. The final vote is the outcome of the overall evaluation of the knowledge exhibited by the student during the two parts of the exam.