Studying at the University of Verona
Here you can find information on the organisational aspects of the Programme, lecture timetables, learning activities and useful contact details for your time at the University, from enrolment to graduation.
Study Plan
This information is intended exclusively for students already enrolled in this course.If you are a new student interested in enrolling, you can find information about the course of study on the course page:
Laurea magistrale in Ingegneria e scienze informatiche - Enrollment from 2025/2026The Study Plan includes all modules, teaching and learning activities that each student will need to undertake during their time at the University.
Please select your Study Plan based on your enrollment year.
1° Year
Modules | Credits | TAF | SSD |
---|
2° Year activated in the A.Y. 2015/2016
Modules | Credits | TAF | SSD |
---|
Modules | Credits | TAF | SSD |
---|
Modules | Credits | TAF | SSD |
---|
Modules | Credits | TAF | SSD |
---|
Tre insegnamenti a scelta
Legend | Type of training activity (TTA)
TAF (Type of Educational Activity) All courses and activities are classified into different types of educational activities, indicated by a letter.
Network security (2014/2015)
Teaching code
4S02798
Teacher
Coordinator
Credits
6
Language
Italian
Scientific Disciplinary Sector (SSD)
ING-INF/05 - INFORMATION PROCESSING SYSTEMS
Period
II sem. dal Mar 2, 2015 al Jun 12, 2015.
Learning outcomes
The objective of the course is to introduce the principal methodologies and technologies for the security of computer networks, of distributed information systems, and of service-oriented software architectures. The course thus provides the main theoretical and applied notions for the theoretical design, the practical realization and the formal analysis of protocols, networks, systems and architectures for information security.
Program
- Introduction and basic notions:
-- Objectives, risks, attacks
-- Symmetric and asymmetric cryptography
-- Public-key infrastructures
-- Communication channels
-- Case studies (X.509, PGP)
- Security protocols:
-- Risk and attack models
-- Formal analysis techniques
-- Case studies (Kerberos, Transport Level Security TLS, Internet Key Exchange IKE, IP Security IPSec, Single Sign-On SSO)
- Privacy and anonymity:
-- Policies, problems and mechanisms (pseudonyms and proxies)
-- Case studies (Mix Networks, Crowds, Side-channel attacks)
- Intruders and firewalls
- Security of Web Services and service-oriented architectures
In order to be able to fully benefit from the course, it is advisable for the student to have attended a course on computer networks.
Examination Methods
The examination consists of a oral examination.