Università degli Studi di Urbino Carlo Bo / Portale Web di Ateneo


CYBERSECURITY
SICUREZZA INFORMATICA

A.Y. Credits
2022/2023 9
Lecturer Email Office hours for students
Alessandro Aldini Tuesday 11-13 at the lecturer office, or else by appointment
Teaching in foreign languages
Course with optional materials in a foreign language English
This course is entirely taught in Italian. Study materials can be provided in the foreign language and the final exam can be taken in the foreign language.

Assigned to the Degree Course

Applied Informatics (LM-18)
Curriculum: PERCORSO COMUNE
Date Time Classroom / Location
Date Time Classroom / Location

Learning Objectives

The objective of this course is to introduce the theory of the modeling of secure cryptographic systems and protocols, on the basis of the current state of the art. Moreover, another goal is to train skills on cybersecurity aimed to identify potential threats of computer and information systems, as well as to protect the related security perimeter.

Program

01. Confidentiality and symmetric key cryptography. 
    01.01 Secret key cryptography.
    01.02 Stream ciphers.
    01.03 Block ciphers.
    01.04 Security against chosen plaintext attack.

02. Integrity, MAC and hashing algorithms.
    02.01 Message authentication code (MAC).
    02.02 Keyed hash functions.
    02.03 Keyless hash functions.

03. Authentication and symmetric key cryptography.
    03.01 Authenticated encryption.
    03.02 Public key cryptography.
    03.03 Security against chosen ciphertext attack.
    03.04 Digital signatures.

04. Cryptographic protocols.
    04.01 Identification protocols.
    04.02 Zero-knowledge proofs (ZKP).
    04.03 Authenticated key exchange.
    04.04 Advanced authentication protocols.
    04.05 Formal verification of cryptographic protocols.

05. Cybersecurity: attack and defense.
    05.01 Security perimeter.
    05.02 Kill chain: penetration testing and attack models.
    05.03 Kill chain: risk management and defense models.
    05.04 Security of the new technologies.
    05.05 Exercises of penetration testing.

Bridging Courses

There are no mandatory prerequisites.

Learning Achievements (Dublin Descriptors)

Knowledge and understanding: the student will be able to understand the theoretical notions behind the definition of cryptographic primitives and behind the construction of secure cryptographic protocols and systems, the solutions aimed at ensuring the main classes of security properties, the management issues for corporate security perimeters and the defense techniques against cyberattacks.

Applying knowledge and understanding: the student will be able to understand the main characteristics that make cryptographic protocols secure and corporate computer systems vulnerable to cyberattacks, with the aim of being able to apply such a knowledge for the modeling of secure systems with respect to the main security properties.

Making judgements: the student will be able to identify the main vulnerabilities of a corporate computer system and to verify the robustness of security perimeters, by specifying which defense tools are more adequate in this respect.

Communication skills: the student will be able to explain appropriately how and by which technologies it is possible to guarantee the security of corporate systems. The student will be also able to determine strengths and weaknesses of the main securing techniques.

Learning skills: the student will learn the capability of estimating the security properties of a cryptographic system and the main analysis techniques used for the verification of the security perimeter of corporate systems.

Teaching Material

The teaching material prepared by the lecturer in addition to recommended textbooks (such as for instance slides, lecture notes, exercises, bibliography) and communications from the lecturer specific to the course can be found inside the Moodle platform › blended.uniurb.it

Teaching, Attendance, Course Books and Assessment

Teaching

Theory lectures and laboratory exercises, both face-to-face and on-line.

Innovative teaching methods

The classroom lectures will be integrated by adopting the "flipped lesson” methodology.

Attendance

Although recommended, course attendance is not mandatory.

Course books

Sections 01 to 04 are covered by: Niels Ferguson, Bruce Schneier: Practical cryptography,  J. Wiley Editor, 2003.

Section 05 is inspired by: Cybersecurity: Attack and Defense Strategies, Yuri Diogenes and Erdal Ozkaya, Pack Pub., 2018.

Assessment

The exam consists of an oral examination and of a project, which contribute to the same extent to the final score.

The oral examination is made out of three questions, one for each section of the course program. The aim of the oral examination is to verify communication skills and level of knowledge and understanding.

The project must be decided in agreement with the lecturer and involves three alternative modes: writing a paper on a depth analysis of a topic on which the student has to prepare a lecture, or else the formal analysis of a cryptographic protocol by using automated software verification tools, or else the deployment of a virtual network in which to conduct penetration testing and validation of defense models. The aim of the project is to verify learning skills and the ability of applying knowledge and understanding, as well as to verify making judgement abilities and communication skills.

Disabilità e DSA

Le studentesse e gli studenti che hanno registrato la certificazione di disabilità o la certificazione di DSA presso l'Ufficio Inclusione e diritto allo studio, possono chiedere di utilizzare le mappe concettuali (per parole chiave) durante la prova di esame.

A tal fine, è necessario inviare le mappe, due settimane prima dell’appello di esame, alla o al docente del corso, che ne verificherà la coerenza con le indicazioni delle linee guida di ateneo e potrà chiederne la modifica.

« back Last update: 09/05/2023

Il tuo feedback è importante

Raccontaci la tua esperienza e aiutaci a migliorare questa pagina.

15 22

Se sei vittima di violenza o stalking chiama il 1522, scarica l'app o chatta su www.1522.eu

Il numero, gratuito è attivo 24 h su 24, accoglie con operatrici specializzate le richieste di aiuto e sostegno delle vittime di violenza e stalking.

Posta elettronica certificata

amministrazione@uniurb.legalmail.it

Social

Università degli Studi di Urbino Carlo Bo
Via Aurelio Saffi, 2 – 61029 Urbino PU – IT
Partita IVA 00448830414 – Codice Fiscale 82002850418
2024 © Tutti i diritti sono riservati

Top