Skip to main content

Course information

  • Complete course name: 055633 - COMPUTER SECURITY - UIC 587 (ZANERO STEFANO)
  • Profesor: Stefano Zanero
  • Tutor: Armando Bellante
  • Accademic year: 2021-2022
  • Recordings: link to webeep
  • Webeep: link to recman

Topics

  • Introduction to computer security
  • Cryptography
  • Authentication
  • Access Control
  • Software security
  • Buffer overflow
  • Format string bugs
  • Web security
  • Network security
  • Malwares

Schedule

DateRecordingTitleSlides
02 24RecordingIntroduction to the course
What is somputer security?
00. Administrivia-new
01. Introduction to Computer Security-new
02 25RecordingAssets
Threats
Security and protection
Risk management
01. Introduction to Computer Security-new
03 03RecordingTrust and assumptions
History of criptography
Definitions in cryptography
Perfectly secure cypher
01. Introduction to Computer Security-new
02 Introduction to cryptography
03 04RecordingCryptographically Safe Pseudorandom Number Generators
Pseudorandom Permutations (Block ciphers)
Data integrity
Message Authentication Codes (MAC)
Hashes
02 Introduction to cryptography
03 10RecordingDiffie-Helman key agreement
Public key encription
Digital signatures
Certification authorities
02 Introduction to cryptography
03 11RecordingEntropy
Identification vs authentication
Three factors of authentication
"to know" factor of authentication
02 Introduction to cryptography
03. Authentication
03 24Recording"to have" factor of authentication03. Authentication
03 25Recording"to be" factor of authentication03. Authentication
03 31RecordingIntroduction to access control
DAC Discretionary Access Control
MAC Mandatory Access Control
Brief introduction to vulnerabilities
04. Access Control
05. Introduction to Software Security
04 01RecordingLife of a vulnerability
Disclosure lifecycle
Exploits
05. Introduction to Software Security
04 07RecordingKey issues in secure design
Recap of x86 for buffer overflow
05. Introduction to Software Security
06. Buffer Overflows
04 08RecordingBuffer overflows
Shell code
06. Buffer Overflows
04 14RecordingPreparing the memory in practice
Shell code in environment variables
Return to libc
06. Buffer Overflows
04 21RecordingDefending against buffer overflows
Introduction to format string bugs
06. Buffer Overflows
07. Format String Bugs
04 22RecordingFormat String Bugs07. Format String Bugs
04 29RecordingIntroduction to web security
Filtering
XSS vulnerabilities
08. Web Application Security
05 05RecordingSQL Injections
Information leaks
Intro to cookies
08. Web Application Security
05 06RecordingCross-Site Request Forgery
Denial of Service
Sniffing
08. Web Application Security
09. Network Protocol Attacks
05 19RecordingARP spoofing
Filling CAM tables
Abusing spanning tree protocol
IP address spoofing
TCP session hijacking
Man in the middle
DNS poisoning
DHCP poisoning
ICMP redirect attack
Route mangling
09. Network Protocol Attacks
05 20RecordingFirewalls
Architectures for secure networks
Demilitarized zone
Virtual Private Networks
10. Secure Network Architectures
05 26RecordingTLS protocol
SET
Malware introduction
11. Network Security Protocols - TLS and SET
12. Malicious Software
05 27RecordingTheory of computer viruses
Malware lifecycle
Malware categories and techniques
Defending against malwares
12. Malicious Software