Unit STANDARD PLANNING OF IT SECURITY WITH ELEMENTS OF FORENSIC INFORMATICS

Course
Informatics
Study-unit Code
A001696
Curriculum
Intelligent and mobile computing
Teacher
Alfredo Milani
Teachers
  • Alfredo Milani
Hours
  • 42 ore - Alfredo Milani
CFU
6
Course Regulation
Coorte 2019
Offered
2020/21
Learning activities
Affine/integrativa
Area
Attività formative affini o integrative
Academic discipline
INF/01
Type of study-unit
Opzionale (Optional)
Type of learning activities
Attività formativa monodisciplinare
Language of instruction
Italian
Contents
1 Information Security policies Information secutiry standards and certification process
2 Risk analysis and management
3 Product certification and Common Criteria ISO/IEC 15408
4 Process certification and ISO2 7001 ISO 27002
5 Business COntinuity and Disaster recovery
6 Secure Coding best practice and standards
7 Digital and Computer Forensics
Reference texts
All the reference material is available http://estudium.unipg.it (ISO standard ISO are available for consultation on request)
Lecture notes and slides
Auditing Guidelines
Documents describing Common Criteria Standard and ISO 2700* standards
Educational objectives
Knowledge of main available standard for Information Security and IT product/process security.
Knowledge of main software vulnerability and secure programming best practice
Ability of analyzing and assessing the aspects of an IT process/product relate to IT security issues, and their certification.
Ability of making a motivated adoption of secure programming techniques
Prerequisites
General knowledge of IT ssytems, Db management systems, Netwrok management.
Basics of computer programming in a standard programming language.
Teaching methods
Front lessons.
Case studied and discussions.
Expert seminars.
Students report presentations,
Fianl project
Other information
See official schedule on http://www.informatica.unipg.it

Elearning platform for student-lecturer interaction and communication (lectures notes, online assignments etc.) http://www.unistudium.unipg.it

The digital forensic part will be integrated by seminars from expert in the area.
Learning verification modality
Written Final Exhamination and final project for students non attending the course.
Continuous assesment with assignments and projects for students attending the course. Continuous assignment consisting in students report presentation. Final project wwill be on assigned topic about information security/digital forensic
Extended program
Programma:

1 Introduction: Information Security policies, example sof policies. General principles: logical and physical security.

2 Information security certification: actors of the certification process. Standards and Certification.
Product certification: ITSEC, Common Criteria (TOE, assurance level). Process Certification rom BS7799 to ISO17799 and to
ISO2700* family. The main certification authority and actors in Italy. Auditor professionals certification.

3 Risk analysis and Risk Management. Vulnerabilities and information assets. Quantitative/Qualitative methos. Residual risk. Countermeasures.
Emergency and information security disaster management. Information security Monitoring and response groupsG: CERT/CSIRT e ISAC, goals and functions. Situation of CERTs in Italy, Europe and the world.
Backup policies and techniques.

4 Product Certification for Information Security: ISO/IEC 15408 Common Criteria certification: general structure, Target of Evaluation,
Security Target (security target components, security requirement rationale etc.).
Security Functional classes and Assurance classes, structurt (classes, families,
components, dipendency). The assurance level EAL. Protection Profiles
Case studied on CC certificated product.

5 Process certification for Information Security:ISO27001/2 e BS7799 certification. The PDCA process. Structure and goals of an ISMS, the 11 areas of interests. ISO27002 control points.
Case studied: auditing a process according to ISO27002. Othe certifications e.g.Health Informatics.

6 Secure Coding: most common software errors and vulnerabilities' (guidelines, areas and common weakness enumeration) Secure programming best practice standards. Java CERT: rules and reccomandation, structure, level and assessment of risk and vulnerability

7 Digital and Computer Forensics: Techniques and methods of digital forensic. The main hardware and softeware tools. Analysis of non standard digital devices. Counterforensics.
Condividi su