Computer And Network Security

Course objectives

General objectives To provide the concepts necessary to: (a) understand the meaning of information security and security of infrastructures and networks; (b) enable the student to make analysis of the fundamental security features of networks and infrastructures; (c) provide the fundamental tools for the design and the assessment of the solutions implemented in the network for the information security requirements. Methodologies and notions include cryptography, access control, security protocols and architectures, firewalls. Specific objectives Capacity to - recognize the requirements of confidentiality, integrity, authenticity, authentication and non-repudiation during the analysis/design phase, identifying suitable standards to guarantee them; - support the process of analysis and definition of security policies at the organization level; - critically evaluate infrastructures and applications with respect to security requirements; - assess the presence of significant vulnerabilities in infrastructures and applications; - study and understand security standards. Knowledge and understanding Knowledge of the fundamentals of cryptography. Understanding of certification mechanisms and digital signature. Understanding of cyber threats arising from interaction with the web and the internet in general Apply knowledge and understanding To select and use effective and secure encryption standards. To select and use effective and secure document fingerprinting standards. To use digital signatures. To choose secure authentication mechanisms. Critical and judgment skills Being able to assess the adequacy of IT security measures employed by a small/medium enterprise. Communication skills Being able to easily and effectively interact with industrial and ICT domain specialists for all issues related to information security. Knowing how to motivate results of analyses and requirements. Learning ability: Ability to read and understand documents with technical standards and/or for the disclosure of new IT threats.

Channel 1
FABRIZIO D'AMORE Lecturers' profile

Program - Frequency - Exams

Course program
1. Principles of Information Security (confidentiality, integrity, authentication, threat models) 2. Symmetric Cryptography and Modes of Operation (AES, ChaCha20, ECB, CBC, CTR) 3. Asymmetric Cryptography and Key Exchange (RSA, Diffie–Hellman, hybrid encryption) 4. Cryptographic Hash Functions and Digital Signatures (SHA, HMAC, RSA signature) 5. Security Protocols and TLS (secure channels, authentication, handshake) 6. Public Key Infrastructure (PKI) (certificates, CAs, trust management) 7. Formal Models and Active Attackers (Dolev–Yao model, protocol analysis) 8. Advanced Topics (CSPRNG, secret sharing, privacy aspects)
Prerequisites
Internetworking, TCP/IP, discrete mathematics and group theory, routing
Books
Slides distributed via Classroom (see website https://sites.google.com/diag.uniroma1.it/cybersecurity/) Network Security: Private Communication in a Public World, by Charlie Kaufman, Radia Perlman, Mike Speciner, Pearson Education (US), 2022
Frequency
Although not mandatory, classroom attendance is strongly recommended.
Exam mode
Written exam is mandatory. An optional oral test is available afterward, but only for students who passed the written exam. Optional: submitting homeworks during the year.
Lesson mode
Interactive lectures in the classroom. Exercises on personal laptops.
FABRIZIO D'AMORE Lecturers' profile

Program - Frequency - Exams

Course program
1. Principles of Information Security (confidentiality, integrity, authentication, threat models) 2. Symmetric Cryptography and Modes of Operation (AES, ChaCha20, ECB, CBC, CTR) 3. Asymmetric Cryptography and Key Exchange (RSA, Diffie–Hellman, hybrid encryption) 4. Cryptographic Hash Functions and Digital Signatures (SHA, HMAC, RSA signature) 5. Security Protocols and TLS (secure channels, authentication, handshake) 6. Public Key Infrastructure (PKI) (certificates, CAs, trust management) 7. Formal Models and Active Attackers (Dolev–Yao model, protocol analysis) 8. Advanced Topics (CSPRNG, secret sharing, privacy aspects)
Prerequisites
Internetworking, TCP/IP, discrete mathematics and group theory, routing
Books
Slides distributed via Classroom (see website https://sites.google.com/diag.uniroma1.it/cybersecurity/) Network Security: Private Communication in a Public World, by Charlie Kaufman, Radia Perlman, Mike Speciner, Pearson Education (US), 2022
Frequency
Although not mandatory, classroom attendance is strongly recommended.
Exam mode
Written exam is mandatory. An optional oral test is available afterward, but only for students who passed the written exam. Optional: submitting homeworks during the year.
Lesson mode
Interactive lectures in the classroom. Exercises on personal laptops.
LEONARDO QUERZONI Lecturers' profile

Program - Frequency - Exams

Course program
1. Principles of Information Security (confidentiality, integrity, authentication, threat models) 2. Symmetric Cryptography and Modes of Operation (AES, ChaCha20, ECB, CBC, CTR) 3. Asymmetric Cryptography and Key Exchange (RSA, Diffie–Hellman, hybrid encryption) 4. Cryptographic Hash Functions and Digital Signatures (SHA, HMAC, RSA signature) 5. Security Protocols and TLS (secure channels, authentication, handshake) 6. Public Key Infrastructure (PKI) (certificates, CAs, trust management) 7. Formal Models and Active Attackers (Dolev–Yao model, protocol analysis) 8. Advanced Topics (CSPRNG, secret sharing, privacy aspects)
Prerequisites
Internetworking, TCP/IP, discrete mathematics and group theory, routing
Books
Slides distributed via Classroom (see website https://sites.google.com/diag.uniroma1.it/cybersecurity/) Network Security: Private Communication in a Public World, by Charlie Kaufman, Radia Perlman, Mike Speciner, Pearson Education (US), 2022
Frequency
Although not mandatory, classroom attendance is strongly recommended.
Exam mode
Written exam is mandatory. An optional oral test is available afterward, but only for students who passed the written exam. Optional: submitting homeworks during the year.
Lesson mode
Interactive lectures in the classroom. Exercises on personal laptops.
LEONARDO QUERZONI Lecturers' profile

Program - Frequency - Exams

Course program
1. Principles of Information Security (confidentiality, integrity, authentication, threat models) 2. Symmetric Cryptography and Modes of Operation (AES, ChaCha20, ECB, CBC, CTR) 3. Asymmetric Cryptography and Key Exchange (RSA, Diffie–Hellman, hybrid encryption) 4. Cryptographic Hash Functions and Digital Signatures (SHA, HMAC, RSA signature) 5. Security Protocols and TLS (secure channels, authentication, handshake) 6. Public Key Infrastructure (PKI) (certificates, CAs, trust management) 7. Formal Models and Active Attackers (Dolev–Yao model, protocol analysis) 8. Advanced Topics (CSPRNG, secret sharing, privacy aspects)
Prerequisites
Internetworking, TCP/IP, discrete mathematics and group theory, routing
Books
Slides distributed via Classroom (see website https://sites.google.com/diag.uniroma1.it/cybersecurity/) Network Security: Private Communication in a Public World, by Charlie Kaufman, Radia Perlman, Mike Speciner, Pearson Education (US), 2022
Frequency
Although not mandatory, classroom attendance is strongly recommended.
Exam mode
Written exam is mandatory. An optional oral test is available afterward, but only for students who passed the written exam. Optional: submitting homeworks during the year.
Lesson mode
Interactive lectures in the classroom. Exercises on personal laptops.
  • Lesson code1022792
  • Academic year2025/2026
  • CourseControl Engineering
  • CurriculumSingle curriculum
  • Year2nd year
  • Semester1st semester
  • SSDING-INF/05
  • CFU6