Unit FORENSIC COMPUTER SCIENCE
- Course
- Investigation and security sciences
- Study-unit Code
- GP004296
- Curriculum
- In all curricula
- Teacher
- Emanuele Florindi
- Teachers
-
- Emanuele Florindi
- Hours
- 36 ore - Emanuele Florindi
- CFU
- 6
- Course Regulation
- Coorte 2022
- Offered
- 2022/23
- Learning activities
- Affine/integrativa
- Area
- Attività formative affini o integrative
- Academic discipline
- INF/01
- Type of study-unit
- Obbligatorio (Required)
- Type of learning activities
- Attività formativa monodisciplinare
- Language of instruction
- Italian
- Contents
- Theory of Information security and Digital Forensics.
- Reference texts
- E.Florindi, Deep web. Vizi privati e pubbliche virtù della navigazione in rete, Lindau editore, 2020
- Educational objectives
- At the end of the course the students will have knowledge of Computer Science required for the Digital Forensic.
Main knowledge acquired will be:
- Knowledge of basic computer science topics
- Elements of computer security and cryptography
- Investigative analyzes - Prerequisites
- None
- Teaching methods
- The course is organized as follows:
- Lectures on all subjects of the course;
- Classroom exercises. - Other information
- Place of lessons
Narni, Piazza Galeotto Marzio
Consult the schedule of lessons and exams from the Department website, http://www.fissuf.unipg.it/didattica - Learning verification modality
- The exam includes only the final oral test consisting of a discussion-interview on the topics discussed during the course and examined in-depth through recommended texts.The test aims at assuring the level of knowledge and understanding, as well as synthesis, achieved by the student. Moreover, this interview will verify that the student is able to communicate, with method, propriety of language and of exposure, what he has acquired. The duration of the test varies depending on the performance of the test itself.
- Extended program
- - Scientific evidence in the process (civil and criminal)
- Computer forensics: procedural outlines and analysis experiences
- Evolution of the concept of computer crime and focus on the following crimes:
* Illegal access: from portascanning to wardriving;
Protection of access codes;
Protection of communications with particular regard to issues related to network administration and defensive activities;
Computer damage and viruses;
Crimes against honour;
Scam and computer fraud: phishing & co;
Internet and pedophilia;
Cyberlaudering;
The protection of confidentiality;
- Computer security
- symmetric and asymmetric encryption
- digital signature
- steganography.
- OSINT;
- Bullying and cyberbullying
- Deep web and dark net