CHRISTIANCARMINE ESPOSITO | DATA SECURITY
CHRISTIANCARMINE ESPOSITO DATA SECURITY
cod. 0522500062
DATA SECURITY
0522500062 | |
COMPUTER SCIENCE | |
EQF7 | |
COMPUTER SCIENCE | |
2024/2025 |
OBBLIGATORIO | |
YEAR OF COURSE 1 | |
YEAR OF DIDACTIC SYSTEM 2016 | |
AUTUMN SEMESTER |
SSD | CFU | HOURS | ACTIVITY | |
---|---|---|---|---|
INF/01 | 7 | 56 | LESSONS | |
INF/01 | 2 | 16 | LAB |
Exam | Date | Session | |
---|---|---|---|
APPELLO PROF. DE SANTIS | 17/02/2025 - 09:00 | SESSIONE ORDINARIA | |
APPELLO PROF. DE SANTIS | 17/02/2025 - 09:00 | SESSIONE DI RECUPERO |
Objectives | |
---|---|
THE GOAL OF THIS COURSE IS TO INTRODUCE STUDENTS TO THE FOUNDATIONS OF MODERN DATA SECURITY, THAT IS PROTECTING DATA, FROM DESTRUCTIVE FORCES AND FROM THE UNWANTED ACTIONS OF UNAUTHORIZED USERS. KNOWLEDGE AND UNDERSTANDING • UNDERSTAND THE KEY CONCEPTS OF DATA SECURITY, SUCH AS ACCESS, INTEGRITY, CONFIDENTIALITY AND AVAILABILITY OF INFORMATION. • FAMILIARITY WITH THE MAIN TYPES OF DATA SECURITY THREATS, SUCH AS HACKING, PHISHING, MALWARE AND IDENTITY THEFT ABILITY TO APPLY KNOWLEDGE AND UNDERSTANDING • KNOWING HOW TO IDENTIFY VULNERABILITIES AND POTENTIAL THREATS TO DATA SECURITY IN DIFFERENT CONTEXTS, SUCH AS INFORMATION SYSTEMS, NETWORKS AND APPLICATIONS. • BE ABLE TO ASSESS THE IMPACT AND LIKELIHOOD OF A DAMAGING EVENT ON DATA SECURITY. |
Prerequisites | |
---|---|
PREREQUISITES BASIC KNOWLEDGE OF • COMPUTER NETWORKS. • DISCRETE MATHEMATICS. • ELEMENTS OF COMPUTATION THEORY. • ELEMENTS OF PROBABILITY THEORY. |
Contents | |
---|---|
THE COURSE MAINLY ADDRESSES THE FOLLOWING TOPICS: • CLASSICAL CRYPTOGRAPHY [2 HOURS]. • ELEMENTS OF CRYPTANALYSIS [2 HOURS]. • BLOCK CIPHERS AND STREAM CIPHERS [6 HOURS]. • ASYMMETRIC CIPHERS [6 HOURS]. • KEY AGREEMENT [4 HOURS]. • DIGITAL SIGNATURES [6 HOURS]. • HASH FUNCTIONS AND MESSAGE AUTHENTICATION CODE [4 HOURS]. • RANDOMNESS AND PSEUDORANDOMNESS [2 HOURS]. • CERTIFICATES AND PKI [4 HOURS]. • SSL AND TLS PROTOCOLS [2 HOURS]. • OPENSSL CRYPTOGRAPHIC TOOLS [4 HOURS]. • BIOMETRIC SYSTEMS [2 HOURS]. • MALWARE AND MALWARE ANALYSIS [4 HOURS]. |
Teaching Methods | |
---|---|
THE TEACHING ACTIVITY, AIMED AT PROVIDING BOTH METHODOLOGICAL AND TECHNOLOGICAL KNOWLEDGE TO WORK IN DATA PROTECTION, IS CHARACTERIZED BY 6 CFU (48 HOURS). STUDENTS ARE GUIDED TO LEARN, CRITICALLY AND RESPONSIBLY, ALL THE CONTENTS OF THE COURSE. AGAIN, THE STUDENTS ARE ENCOURAGED TO ENRICH THEIR JUDGMENT SKILLS THROUGH THE STUDY OF THE TEACHING MATERIAL. THE TEACHING MATERIAL CAN BE ACCESSED THROUGH THE REFERENCE WEBSITE OF THE COURSE (HTTP://WWW.DI-SRV.UNISA.IT/~ADS/PAGES/INDEX.PHP/SICUREZZA-SU-RETI/). ATTENDANCE IS STRONGLY RECOMMENDED. STUDENTS MUST SPEND A FAIR AMOUNT OF TIME FOR INDIVIDUAL STUDY. ADEQUATE PREPARATION REQUIRES, ON AVERAGE, TWO HOURS OF STUDY FOR EACH HOUR OF THE LESSON. |
Verification of learning | |
---|---|
THE ACHIEVEMENT OF THE TEACHING OBJECTIVES IS CERTIFIED BY PASSING AN EXAM WITH AN ASSESSMENT OUT OF THIRTY. THE EXAM USUALLY INCLUDES A WRITTEN TEST AND AN OPTIONAL PROJECT ACTIVITY AND AN OPTIONAL ORAL EXAMINATION. THE WRITTEN TEST TAKES PLACE BEFORE THE ORAL EXAMINATION AND IS PASSED WITH THE ACHIEVEMENT OF A PRE-ESTABLISHED MINIMUM SCORE. THE WRITTEN TEST CAN BE COMPOSED OF BOTH OPEN-ENDED AND MULTIPLE-ANSWER QUESTIONS. THE WRITTEN TEST MAY INCLUDE BOTH THEORETICAL QUESTIONS AND EXERCISES. THE QUESTIONS MAY HAVE A DIFFERENT WEIGHT, AND THE WEIGHT ASSIGNED TO EACH QUESTION WILL DEPEND ON THE COMPLEXITY OF THE QUESTION ITSELF. THE ORAL EXAMINATION CONSISTS OF AN INTERVIEW, WITH QUESTIONS FOCUSING ON THE THEORETICAL, METHODOLOGICAL, AND INSTRUMENTAL CONTENTS INDICATED IN THE TEACHING PROGRAM. THE ORAL EXAMINATION IS AIMED AT ASSESSING THE LEVEL OF KNOWLEDGE, MATURITY, AND UNDERSTANDING REACHED BY THE STUDENT. THE FINAL MARK IS USUALLY THE AVERAGE OF THE ASSESSMENTS OF THE WRITTEN TEST, OF THE PROJECT ACTIVITY AND OF THE ORAL TESTS. |
Texts | |
---|---|
REFERENCE BOOKS: • CRYPTOGRAPHY AND NETWORK SECURITY: PRINCIPLES AND PRACTICES, PRENTICE-HALL (7/ED), WILLIAM STALLINGS, 2016 • CRITTOGRAFIA E SICUREZZA DELLE RETI, MCGRAW-HILL (2/ED), WILLIAM STALLINGS, 2007 OTHER BOOKS FOR IN-DEPTH ANALYSES: • HANDBOOK OF APPLIED CRYPTOGRAPHY, ALFRED J. MENEZES, SCOTT A. VANSTONE, 1996 • CRYPTOGRAPHY: THEORY AND PRACTICE (4TH ED.), DOUGLAS STINSON AND MAURA PATERSON, 2018 HANDOUTS AND MATERIAL PROVIDED BY THE TEACHER. |
More Information | |
---|---|
THE TEACHING MATERIAL IS MADE AVAILABLE ON THE COURSE WEBSITE (HTTP://WWW.DI-SRV.UNISA.IT/~ADS/PAGES/INDEX.PHP/SICUREZZA-SU-RETI/). FOR ANY OTHER INFORMATION, THE STUDENTS CAN CONTACT THE COURSE TEACHERS: • ALFREDO DE SANTIS (E-MAIL: ADS@UNISA.IT) |
BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2025-01-27]