Skip to main content
CODE 108931
ACADEMIC YEAR 2025/2026
CREDITS
SCIENTIFIC DISCIPLINARY SECTOR ING-INF/03
LANGUAGE English
TEACHING LOCATION
  • GENOVA
SEMESTER 1° Semester
MODULES Questo insegnamento è un modulo di:
TEACHING MATERIALS AULAWEB

OVERVIEW

The course aims to provide the student with a basic knowledge of the main aspects and technologies relating to the security of telecommunications networks, with the basic concepts, reference terminology, security architectures, and the main encryption techniques (symmetrical and asymmetrical) being summarised at the beginning of the course. It is noted that, although the proposed content is mainly focused on network and telecommunications security topics, most of it is also relevant to the general context of computer security.

AIMS AND CONTENT

LEARNING OUTCOMES

The module aims to provide students with basic knowledge of the main aspects and technologies related to the security of telecommunications networks and, in a broader sense, of distributed computing systems. The knowledge acquired enables the student to deal with the design, configuration, and management of telecommunications and IT security in complex digital systems. The topics covered are organized into three parts: - Basic Technologies: cryptography, secure hashing, message authentication code, digital signature, key distribution, and authentication. - Protocols: data link layer security, network layer security, transport layer security, application layer security. - Specific technologies: firewalling, blockchain, and cloud security”.

AIMS AND LEARNING OUTCOMES

The course's main objective is to provide a basic knowledge of the main aspects and techniques required to implement secure network and telecommunications services. The class is structured into two main parts.

The first part, after a concise reminder of the basic concepts, architectures, and main encryption techniques, completes the knowledge of the fundamental technologies with the presentation and discussion of secure hash functions, causal number generation mechanisms for security applications, data integrity assurance technologies, digital signature mechanisms, key distribution techniques and finally authentication approaches and solutions.

The second part introduces and describes the most relevant security protocols in use at the different network layers, in particular the line layer, the protocols and mechanisms adopted on both wired and wireless LANs, the IPSec protocol for the network layer, the SSL-TSL protocols for the transport layer, and secure e-mail and DNS protection mechanisms at the application layer.

As a final topic, firewalls' operation and use, hints of blockchain, and cloud security are addressed.

At the end of the course, the student is familiar with the leading cyber security techniques used in telecommunications networks, can identify the most suitable solutions for securing different network contexts, and can critically analyze approaches that have already been adopted or proposed.

PREREQUISITES

The student, to understand the course, need to have followed and studied the course Internet Technologies: Architectures and Protocols (90147) or to know about the following arguments 

  • Basic concepts of data networking, 
  • Circuit and packet switching
  • Functional architectures
    • ISO OSI architecture
    • TCP/IP architecture, 
  • Physical layer main characteristics (cables, optical fiber)
  • Data layer essential characteristics
    • Ethernet/IEEE 802.3 protocol
    • Layer 2 bridging/switching
    • WiFi
  • IPv4 basic concepts, including routing algorithms and protocols.
  • TCP/UDP basic knowledge.
  • Application level: Email, DNS
  • Security related terminologies, security requirements, security mechanisms, attack types, security architectures, and models.
  • Fundamentals of cryptography: classical cryptographic techniques; symmetric ciphers (block ciphers: DES and AES); block encryption operation mode, stream encryption, public-key cryptography (RSA, Diffie-Hellman, ECC).

TEACHING METHODS

Traditional direct lessons with application experiences, which are chosen among the network, transport, application layers, or firewalls. Please note that both support material and lectures are in English.

Students with valid certifications for Specific Learning Disorders (SLDs), disabilities or other educational needs are invited to contact the teacher and the School's contact person for disability at the beginning of teaching to agree on possible teaching arrangements that, while respecting the teaching objectives, take into account individual learning patterns. Contacts of the School's disability contact person can be found at the following link Comitato di Ateneo per l’inclusione delle studentesse e degli studenti con disabilità o con DSA | UniGe | Università di Genova

 

SYLLABUS/CONTENT

  • Secure hash functions
  • Message Authentication Code (MAC)
  • Digital signature
  • Key distribution techniques
  • Authentication methods
  • Telecommunication network protocols for security
    • Link Layer: NAC and WiFi Security
    • Network Layer: IP-Sec
    • Transport Layer: SSL/TSL
    • Application Layer: Secure Email and DNS
  • Firewalls
  • Block chains
  • Cloud security

RECOMMENDED READING/BIBLIOGRAPHY

  1. Course material on Aulaweb: a copy of all lecture slides
  2. W. Stallings, Cryptography and Network Security – Principles and Practice (8th Global Edition), Pearson, 2022

Students with valid certifications for Specific Learning Disorders (SLDs), disabilities or other educational needs are invited to contact the teacher for additional support materials.

TEACHERS AND EXAM BOARD

LESSONS

Class schedule

The timetable for this course is available here: Portale EasyAcademy

EXAMS

EXAM DESCRIPTION

The examination consists of an initial multiple-choice written test followed by an oral assessment. The examined students only access the oral assessment if they obtain a score above a minimum threshold of sufficiency on the test.

ASSESSMENT METHODS

Within the mandatory written examination, the student's knowledge of the main concepts discussed in the course shall be evaluated. The oral exam ascertains the level of critical capacity and reasoning acquired by the student on the course topics through pointed questions on the various technologies, requests to outline possible solutions to application problems, and critical analysis of predefined scenarios and situations.

Students with learning disorders ("disturbi specifici di apprendimento", DSA) will be allowed to use specific modalities and supports that will be determined on a case-by-case basis in agreement with the delegate of the Engineering courses in the Committee for the Inclusion of Students with Disabilities.