University of L'Aquila
Department of Information Engineering Computer Science and Mathematics
Academic Year 2015/2016
|
(Click here) to get News
Information Systems and Network Security (6 CREDITS).
Link to the Computer Science Degree official website (click here).
Description:
This course provides an introduction to Information Systems and Network Security. Topics include:
- Basics of Cryptology.
- Information Systems Security: - Information Technology Security, Crime, Compliance, Continuity. - Threats, Vulnerabilities, and Risk Exposure. - Defense: Information Technology Defense.
- Game Theory for Network Security.
- Introduction to Information Systems.
- Algorithmic Issues arising in Information Systems: Revenue Maximization Envy-Free Pricing Problems.
- Introduction to Cloud Computing.
- Algorithmic Issues arising in Information Systems: Scheduling Algorithms; Envy-Free Scheduling.
Additional topics will be covered as time permits.
Timetable:
Second semester (February 22, 2016 - June 9, 2016), Tuesday: 9.00–11.00 (room A 1.2) and Thursday: 9.00–11.00 (room A 1.2)
Students’ reception:
Starting by June 13, 2016, given that I could be out of the office due to academic or research commitments,
students are invited to arrange the day and time of the meeting by e-mail and therefore to send an e-mail preventively.
Course Material:
Lecture notes (slides) provided by the lecturer. Plus the extra didactic material (please do not hesitate to contact me if you have problems with finding them).
Extra didactic material:
- Jens Grossklags, Nicolas Christin, John Chuang:
Secure or Insure? A Game-Theoretic Analysis of Information Security Games. Proceedings of the International World Wide Web Conference (WWW) 2008.
The paper can be found (here)
- M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz,
A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, M. Zaharia:
A view of cloud computing. Commun. ACM 53(4): 50-58 (2010).
The paper can be found (here)
- Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia:
Above the Clouds: A Berkeley View of Cloud Computing.
EECS Department, University of California, Berkeley
Technical Report No. UCB/EECS-2009-28, February 10, 2009.
The paper can be found (here)
Additional didactic material:
- Charlie Kaufman, Radia Perlman, Mike Speciner:
“Network Security: Private Communication in a Public World (2nd Edition)”. Prentice Hall, 2002.
- Peter Brucker: “Scheduling Algorithms”. Springer, 2007.
Course Program:
February 23, 2016: Presentation of the course.
February 25, 2016: Basics of cryptology: introduction (first part). Slides (Click here).
March 1, 2016: Basics of cryptology: introduction (second part). Slides (Click here).
March 3, 2016: Basics of cryptology: introduction (third and last part). Slides (Click here).
March 8, 2016: Symmetric cryptography: Stream ciphers (RC4), Block ciphers (Electronic codebooks(ECB) , Cipher-block chaining (CBC) , Cipher feedback (CFB),
Output feedback (OFB), Counter (CTR)). Slides (Click here). Exercises on Stream Ciphers:
Exercises solutions have been proposed on the blackboard.
March 10, 2016: Symmetric cryptography: Block ciphers (Substitution-permutation (SP) networks, Feistel ciphers, Data Encryption Standard (DES), 3DES, Advanced Encryption Standard (AES): an overview).
Slides (Click here).
March 15, 2016: Exercise on Cipher-block chaining (CBC): Exercise solution has been proposed on the blackboard.
Message Authentication Code (MAC), Hash functions. Slides (Click here).
March 17, 2016: Exercises on Applications of hash functions: Exercises solutions have been proposed on the blackboard.
Hash functions: MD5 (overview) and SHA1 (overview) Slides (Click here).
Asymmetric cryptography, RSA (first part) Slides (Click here).
March 22, 2016: Asymmetric cryptography, RSA (second and last part), Diffie-Hellman cipher (first part). Slides (Click here).
March 31, 2016: Diffie-Hellman cipher: man-in-the-middle attack (second and last part). Slides (Click here).
Information technology Security, Crime, Compliance, and Continuity. Slides (Click here).
April 5, 2016: Exercises on decryption with Cipher-block chaining (CBC), CBC residue with Hash function, RSA, Diffie-Hellmann: Exercises solutions have been proposed on the blackboard.
April 7, 2016: Network Security: A Game Theoretic Approach (first part). Slides (Click here).
April 12, 2016: Network Security: A Game Theoretic Approach (second part): security games instances. Slides (Click here).
April 14, 2016: Secure or insure? A game-theoretic analysis of information security games. Slides (Click here).
April 26, 2016: Mid-term exam exercises solutions (exercises solutions have been proposed on the blackboard). Mid-term exam questions solutions.
April 28, 2016: Information systems nowadays. Slides (Click here).
May 3, 2016: Cloud Computing (first part). Slides (Click here).
May 5, 2016: Cloud Computing (second and last part). Slides (Click here).
Scheduling Algorithms (Introduction). Slides (Click here).
May 10, 2016: Scheduling Algorithms (Part I). Slides (Click here).
May 12, 2016: Scheduling Algorithms (Part II). Slides (Click here).
May 17, 2016: Scheduling Algorithms (Part III). Slides (Click here).
Envy-free Identical Scheduling (Part I : Introduction). Slides (Click here).
May 19, 2016: Envy-free Identical Scheduling (Part II). Slides (Click here).
May 24, 2016: Envy-free Identical Scheduling (Part III). Slides (Click here).
May 26, 2016: Envy-free Unrelated Scheduling. Slides (Click here).
May 31, 2016: Exercises on scheduling: Exercises solutions have been proposed on the blackboard.
(Click here).
June 7, 2016: Revenue Maximizing Envy-free Pricing Problem (Part I). Slides (Click here).
June 9, 2016: (2 lectures) Revenue Maximizing Envy-free Pricing Problem (Part II). Slides (Click here).
Question time.
News:
March 1, 2016: Students are invited to report any typo that slides might contain.
March 22, 2016: The Mid-term exam date is Tuesday April 19, 9.00-11.00, room A 1.2 .
April 16, 2016: Arguments of lecture of April 14 are not part of the Mid-term exam questions.
April 20, 2016: Available the results of the Mid-term exam of April 19, 2016.
(Click here)
April 26, 2016: Errata Corrige Last 3 slides (Mixed Nash Equilibria for Evildoer Game) of the lecture given April 12, 2016.
Slides (Click here).
April 28, 2016: Click here to download the assignment of the mid-term examination of April 19, 2016.
May 7, 2016: The lecture of Thursday May 12, from 9.00 to 11.00 a.m., has been moved to room C3.25 (Coppito 2).
May 25, 2016: Final exams semester #2 A.Y. 2015/2016: (Period June 13, 2016 - July 29, 2016)
1° Tuesday June 21, 2016: 09.30 (room A1.2)
2° Tuesday July 5, 2016: 09.30 (room A1.2)
3° Tuesday July 19, 2016: 09.30 (room A1.2)
May 31, 2016: Due to the holiday of June 2, there will be an extra class Thursday June 9, 2016: 14.00-16.00. Room A1.4 (Coppito 0).
June 9, 2016: STUDENTS' RECEPTION: Starting by June 13, given that I could be out of the office due to academic or research commitments,
students are invited to arrange the day and time of the meeting by e-mail and therefore to send an e-mail preventively.
June 19, 2016: SEMINAR: Students interested in Nash equilibria topics are invited to attend the seminar "Nash Equilibria in Network Design Games with Fair Cost Allocation".
that I will give Tuesday, June 21th, 15:00, at room A1.5, Blocco 0.
June 23, 2016: Click here to download the assignment of the examination of June 21, 2016.
Available the results of the examination of June 21, 2016.
(Click here). Exams recording and oral exams: Tuesday June 28, Time: 9.30 a.m..
June 30, 2016: Final exams A.Y. 2015/2016: (Period September 1, 2016 - September 16, 2016)
- Tuesday September 6, 2016: 09.30
July 6, 2016: Available the results of the examination of July 5, 2016.
(Click here). Exams recording and oral exams: Thursday July 7, Time: 10:00 a.m..
July 7, 2016: Click here to download the assignment of the examination of July 5, 2016.
July 20, 2016: Available the results of the examination of July 19, 2016.
(Click here). Exams recording and oral exams: Thursday July 21, Time: 10:00 a.m.
July 22, 2016: Click here to download the assignment of the examination of July 19, 2016.
September 11, 2016: Available the results of the examination of September 6, 2016.
(Click here). Exams recording and oral exams: Tuesday September 13, Time: 10:00 a.m.
September 19, 2016: Click here to download the assignment of the examination of September 6, 2016.