Introduction to Information Security

Course objectives

General objectives: The course aims at training professionals able to successfully face the challenges posed by the security problems of the information society. Specific objectives: The course includes the study of various models of access control, analysis of the main difficulties and resolutions of cryptographic problems and the main security protocols used in the network Knowledge and understanding: Upon passing the exam, the student will have knowledge and understanding of the bases of computer security and of the main technologies for the analysis and solution of security problems. Apply knowledge and understanding: The course enables students to apply their knowledge and understanding skills to solve IT security problems, with sufficient autonomy to deal with complex problems; and for the effective consultation of advanced scientific and technological documentation. Autonomy of judgment: The course aims to acquire autonomous interpretation skills to propose solutions to security problems congruent with the available technologies, and to continuously update the technological evolution, to formulate independent critical judgments contributing to the progress of system security. Communication skills: Students acquire the ability to present and to argue their ideas about the security problems faced and the solutions proposed, both with colleagues and with users Next learning ability: The course provides for the development of in-depth capabilities in the field of computer security both of methodological and technological aspects, to adapt to the progress of techniques and solutions to the most common security problems, and to continue autonomously to solve new problems. safety issues.

Channel 1
EMILIANO CASALICCHIO Lecturers' profile

Program - Frequency - Exams

Course program
- Introduction to the course; - Concepts of computer and network security; - User authentication; - Access Control; - Database and data center security - Malicious Software - Denial of Service Attacks - Intrusion detection - Buffer overflows - Software Security - Security of Operating Systems - Symmetric Encryption and message confidentiality - Message Authentication and Public-Key Cryptography
Prerequisites
Operating systems (I and II module) Computer networks
Books
- Sicurezza dei Computer e delle reti, William Stallings, A cura di A.De Paola e G.Lo Re, Ed. Pearson - Computer Security principles and practice, 4th ed, William Stallings, Lawrie Brown, Ed Pearson
Frequency
Strongly suggested
Exam mode
The assessment of skills takes place through: - Homework assigned during the course (optional) - Oral exam
Bibliography
- Sicurezza dei Computer e delle reti, William Stallings, A cura di A.De Paola e G.Lo Re, Ed. Pearson - Computer Security principles and practice, 4th ed, William Stallings, Lawrie Brown, Ed Pearson
Lesson mode
The course consists of lectures in which the topics of the course are presented.
  • Lesson code1022268
  • Academic year2025/2026
  • CourseComputer Science
  • CurriculumSingle curriculum
  • Year3rd year
  • Semester2nd semester
  • SSDINF/01
  • CFU6