Unit FORENSIC COMPUTER SCIENCE

Course
Investigation and security sciences
Study-unit Code
GP004296
Curriculum
In all curricula
Teacher
Emanuele Florindi
Teachers
  • Emanuele Florindi
Hours
  • 36 ore - Emanuele Florindi
CFU
6
Course Regulation
Coorte 2022
Offered
2022/23
Learning activities
Affine/integrativa
Area
Attività formative affini o integrative
Academic discipline
INF/01
Type of study-unit
Obbligatorio (Required)
Type of learning activities
Attività formativa monodisciplinare
Language of instruction
Italian
Contents
Theory of Information security and Digital Forensics.
Reference texts
E.Florindi, Deep web. Vizi privati e pubbliche virtù della navigazione in rete, Lindau editore, 2020
Educational objectives
At the end of the course the students will have knowledge of Computer Science required for the Digital Forensic.
Main knowledge acquired will be:
- Knowledge of basic computer science topics
- Elements of computer security and cryptography
- Investigative analyzes
Prerequisites
None
Teaching methods
The course is organized as follows:
- Lectures on all subjects of the course;
- Classroom exercises.
Other information
Place of lessons
Narni, Piazza Galeotto Marzio

Consult the schedule of lessons and exams from the Department website, http://www.fissuf.unipg.it/didattica
Learning verification modality
The exam includes only the final oral test consisting of a discussion-interview on the topics discussed during the course and examined in-depth through recommended texts.The test aims at assuring the level of knowledge and understanding, as well as synthesis, achieved by the student. Moreover, this interview will verify that the student is able to communicate, with method, propriety of language and of exposure, what he has acquired. The duration of the test varies depending on the performance of the test itself.
Extended program
- Scientific evidence in the process (civil and criminal)
- Computer forensics: procedural outlines and analysis experiences
- Evolution of the concept of computer crime and focus on the following crimes:
* Illegal access: from portascanning to wardriving;
Protection of access codes;
Protection of communications with particular regard to issues related to network administration and defensive activities;
Computer damage and viruses;
Crimes against honour;
Scam and computer fraud: phishing & co;
Internet and pedophilia;
Cyberlaudering;
The protection of confidentiality;

- Computer security
- symmetric and asymmetric encryption
- digital signature
- steganography.
- OSINT;
- Bullying and cyberbullying
- Deep web and dark net
Condividi su