Clemente GALDI | CYBER WARFARE
Clemente GALDI CYBER WARFARE
cod. 1222500033
CYBER WARFARE
1222500033 | |
DEPARTMENT OF MANAGEMENT & INNOVATION SYSTEMS | |
EQF7 | |
GLOBAL STUDIES AND EU | |
2024/2025 |
OBBLIGATORIO | |
YEAR OF COURSE 2 | |
YEAR OF DIDACTIC SYSTEM 2018 | |
SPRING SEMESTER |
SSD | CFU | HOURS | ACTIVITY | |
---|---|---|---|---|
INF/01 | 6 | 42 | LESSONS |
Exam | Date | Session | |
---|---|---|---|
GALDI | 10/12/2024 - 10:00 | SESSIONE ORDINARIA | |
GALDI | 10/12/2024 - 10:00 | SESSIONE DI RECUPERO |
Objectives | |
---|---|
THE COURSE AIMS TO PROVIDE STUDENTS WITH THE KNOWLEDGE AND SKILLS TO UNDERSTAND THE COMPLEX WORLD OF CYBER WARFARE. THE COURSE DEFINES THE SKILLS ALONG THREE MAIN LINES: UNDERSTANDING THE STRATEGIC ASSETS THAT LEND THEMSELVES TO ATTACKS IN THE CYBER SPHERE, UNDERSTANDING THE MOST COMMON ATTACK METHODOLOGIES AND IDENTIFYING THE EFFECTS THAT THESE ATTACKS CAN HAVE IN THE "REAL" WORLD. THE COURSE WILL ANALYZE BOTH CLASSICAL INFRASTRUCTURES SUCH AS, FOR EXAMPLE, THOSE FOR THE MANAGEMENT OF COMMUNICATIONS, ENERGY OR INDUSTRIAL PRODUCTION, AND NEW DIGITAL INFRASTRUCTURES SUCH AS FOR EXAMPLE SOCIAL NETWORKS, BLOCKCHAIN PLATFORMS OR CRYPTOCURRENCIES. AT THE END OF THE COURSE, STUDENTS WILL BE ABLE TO ANALYZE REALISTIC OPERATIONAL CONTEXTS, HIGHLIGHTING CYBER THREATS THAT NEED TO BE TAKEN INTO ACCOUNT AND DESCRIBING POSSIBLE TECHNOLOGICAL SOLUTIONS THAT ARE ABLE TO COUNTER THEM. LAB ACTIVITY INVOLVES THE USE OF SOFTWARE FOR THE ANALYSIS OF NETWORK SYSTEMS VULNERABILITIES AND THE SIMULATION / EXECUTION OF ATTACKS ON NETWORK SYSTEMS. THE STUDENT WILL BE ABLE TO - IDENTIFY INTERDEPENDENCIES BETWEEN DIGITAL AND PHYSICAL SYSTEMS; - UNDERSTAND THE CASCADE EFFECTS TRIGGERED BY FAULTS IN SOME COMPONENTS. THE STUDENT WILL BE ABLE TO COMMUNICATE CLEARLY, EVEN IN ENGLISH AND/OR TO NON-SPECIALIZED PERSONNEL, THE DANGERS DERIVING FROM THE USE OF DIGITAL TOOLS AND THE METHODOLOGIES FOR PREVENTING ATTACKS. THE STUDENT WILL BE ABLE TO: - USE TRADITIONAL BIBLIOGRAPHIC TOOLS AND IT ANALYSIS AND ARCHIVING RESOURCES; - CARRY OUT RESEARCH, UNDERSTAND AND INTERPRET COMPLEX, TECHNICAL TEXTS; - PROCEED WITH THE CONTINUOUS UPDATING OF ONE'S KNOWLEDGE, USING TECHNICAL AND SCIENTIFIC LITERATURE AND THROUGH THE USE OF ONLINE SOURCES |
Prerequisites | |
---|---|
BASIC KNOWLEDGE OF COMPUTER SCIENCE AND PROGRAMMING. ABSTRACTION CAPABILITIES WILL BE USEFUL TO IDENTIFY FUNDAMENTAL DATA THAT INFLUENCE A GIVEN PHENOMENON. |
Contents | |
---|---|
A 42 HOURS THEORY MODULE AND A 21 HORS LABORATORY MODULE. - INFORMATION SECURITY. TECHNIQUES AND TOOLS FOR DATA PROTECTION. INTRODUCTION TO CYBER WARFARE. (10 HOURS CLASS LECTURES, 3 HOURS LAB) HISTORY OF CYBER ATTACKS. ATTACK TYPES AND TOOLS. CENTRALIZED AND DISTRIBUTED ATTACKS. ADVERSARY TAXONOMY. (10 HOURS CLASS LECTURES, 3 HOURS LAB) - CYBER ATTACKS AS TOOLS FOR INDUSTRIAL ESPIONAGE. ILLEGAL ACQUISITION INTELLECTUAL PROPERTY. CYBER EXPLOITATION. USE OF SOCIAL NETWORKS IN CYBER WARFARE. (8 HOURS CLASS LECTURES, 3 HOURS LAB) - CYBER ATTACKS TO CRITICAL INFRASTRUCTURES. ATTACKS TO INDUSTRIAL SYSTEMS, DATA/POWER NETWORKS, POWER PLANTS. (4 HOURS CLASS LECTURES, 3 HOURS LAB) - CYBER ATTACKS TO SOCIAL. FAKE NEWS, DEEP FAKE, ELECTORAL CAMPAIGNS. (4 HOURS CLASS LECTURES, 3 HOURS LAB) - CRYPTOGRAPHIC PRIMITIVES AND THEIR APPLICATIONS. NEW TECHNOLOGIES IN ECONOMY: BLOCKCHAIN AND CRYPTO CURRENCIES. (6 HOURS CLASS LECTURES, 6 HOURS LAB) |
Teaching Methods | |
---|---|
THE COURSE CONSISTS OF 42 HOURS OF THEORETICAL LECTURES AND 21 HOURS OF PRACTICAL SESSIONS IN LAB. DURING THE LATTER THE STUDENTS WILL BE REQUIRED TO SOLVE EXERCISES UNDER THE GUIDANCE OF THE INSTRUCTOR. ATTENDANCE TO LESSONS IS NOT MANDATORY BUT STRONGLY RECOMMENDED. |
Verification of learning | |
---|---|
THE EXAMS CONSISTS OF A PROJECT WORK DEVELOPER DURING THE COURSE AND OF A FINAL ORAL EXAMINATION. STUDENTS WILL BE EVALUATED BY USING A SCALE OF 30. FINAL SCORE DEPENDS ON 50% PROJECT WORK AND 50% ORAL EXAMINATION. THE PROJET WORK WILL EVALUATE THE ABILITY TO ANALYZE, DEVELOP OR USE ATTACK/DEFENCE SYSTEMS ANALIZED DURING THE LECTURES |
Texts | |
---|---|
PAULO SHAKARIAN, JANA SHAKARIAN, ANDREW RUEF INTRODUCTION TO CYBER-WARFARE: A MULTIDISCIPLINARY APPROACH ELSEVIER |
More Information | |
---|---|
NONE |
BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2024-11-18]