Understand the problem of network security as a transversal requirement to all levels of the TCP/IP protocol stack.
Explain the vulnerabilities of main applicational services and protocols, transport and network protocols, and corresponding security solutions.
Explain the vulnerabilities of main wireless and mobile technologies, and corresponding security solutions.
Identify the types of security attacks stemming from vulnerabilities of TCP/IP protocol stack.
Explore network operational security using tools for protocol analysis.
Apply secure protocol solutions in support of network applications and services from an end-to-end perspective.
Program
Introduction to security in TCP/IP Networks
Identification and classification of vulnerabilities
Models and types of attacks
Security of application services and protocols (HTTPS, email, DNS, BGP)
End-to-end data transport security: TLS/TCP, QUIC/UDP protocols
Network-level security: IPv4 vs IPv6, IPSec, VPNs
Security in wireless and mobile networks
Network operational security: protocol analysis
Bibliography
Stallings W., “Cryptography and Network Security: Principles and Practice”, Pearson, 8th Edition, ISBN: 978-1292437484, June 2022.
Stallings W., Brown L., “Computer Security Principles and Practice”, Pearson, 5th Edição, ISBN-13: 9780138091712, July 2023.
Sriram, K. and Montgomery, D., “Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation”, NIST Special Publication (NIST SP), 2019, [online], https://doi.org/10.6028/NIST.SP.800-189, (Accessed June, 2024).
Rose S. et al., “Trustworthy Email”, NIST Special Publication (NIST SP), 2019, [online], https://doi.org/10.6028/NIST.SP.800-177r1 (Accessed June, 2024).
Barker E. et al., “Guide to IPsec VPNs”, NIST Special Publication (NIST SP), 2020, [online], https://doi.org/10.6028/NIST.SP.800-77r1 (Accessed June, 2024).
Mapa III - Serviços e Protocolos Multimédia