Unit INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS
- Course
- Informatics
- Study-unit Code
- A003520
- Curriculum
- Artificial intelligence
- CFU
- 6
- Course Regulation
- Coorte 2024
- Offered
- 2025/26
- Type of study-unit
- Opzionale (Optional)
- Type of learning activities
- Attività formativa integrata
COMPLIANCE AND CERTIFICATION
| Code | A003521 |
|---|---|
| CFU | 4 |
| Teacher | Filippo Bianchini |
| Teachers |
|
| Hours |
|
| Learning activities | Affine/integrativa |
| Area | Attività formative affini o integrative |
| Sector | INF/01 |
| Type of study-unit | Opzionale (Optional) |
| Language of instruction | English |
| Contents | 1 Information Security policies Information security standards and certification process 2 Product certification and Common Criteria ISO/IEC 15408 3 Cybersecurity: regulations, laws, and agencies shaping the cybersecurity landscape 4 Risk analysis and management 5 Process certification and ISO27001 ISO 27002 6 Business Continuity and Disaster recovery 7 Digital and Computer Forensics |
| Reference texts | All the reference material is available http://unistudium.unipg.it (ISO standard ISO are available for consultation on request). Lecture notes, slides and handouts. Auditing guidelines. Documents describing Common Criteria Standard and ISO 2700* standards and recommendations from AgID and ENISA. Training materials for points 1, 2 and 3 available on the ItalianCyberTeam.it website: https://italiancyberteam.it/dim-dipartimento-informatica/ |
| Educational objectives | Knowledge of the main issues in IT security. Knowledge of the main standards for product and process IT security. Knowledge of the principles and technological foundations of computer forensics. Knowledge of key software vulnerabilities and best practices for secure programming Ability to analyze and evaluate aspects of an IT product/process in relation to security issues and their certification. Knowledge of the main local and international infrastructures for the implementation of monitoring and response services for security criticalities. Ability to understand and perform digital forensic activities (computer, mobile, cloud, network, cybertriage) according to UNI ISO guidelines. |
| Prerequisites | Basic prerequisites for effective understanding of the course topics: general knowledge of the main topics related to information and communication technologies and knowledge of object-oriented and non-object-oriented programming languages, issues related to database concurrency, and software engineering. Knowledge of the basics of computer systems, database management systems, networks, and the web. Knowledge of basic programming elements in a programming language. Basic concepts of computer security. Knowledge of the file systems of the main Operating Systems. |
| Teaching methods | Lectures. Discussion of case studies. Seminars by experts. Flipped Lessons. Presentation of students' ongoing reports (exemptions). Final project. |
| Other information | Classes timetable and exams schedule at http://www.informatica.unipg.it and http://www.dmi.unipg.it/didattica/corsi-di-studio-in-informatica/informatica-magistrale The digital forensic classes will also host seminars from professional expert in the field. |
| Learning verification modality | Written Final Examination and final project for students non attending the course. Continuous assessment with assignments and projects for students attending the course. Continuous assignment consisting in students report presentation. Final project will be on assigned topic about information security/digital forensic. For information on support services for students with disabilities and/or SLDs, visit http://www.unipg.it/disabilita-e-dsa |
| Extended program | Programme: 1 Certification, organisations, basic concepts, Management Systems, HSL, Audit vs Assessment, how an audit is carried out, ISO 17021, 17011, scenario simulations. The main certification bodies in Italy. Certification of auditor personnel. 2 Product certification: ISO/IEC 15408 Common Criteria certification: General structure, Target of Evaluation, Security Target (components of a security target, security requirement rationale, etc.). Security Function Classes and Assurance Classes, structure (classes, families, components, dependencies) and meaning. EAL assurance levels. Protection Profiles. Case study exercise on CC-certified product. 3 Cybersecurity: regulations, laws, and agencies shaping the cybersecurity landscape: ACN, ENISA, NCSF 2.1, NIS2, CSF 1.1 to CSF 2.0, ENISA, and the mapping/conversion between ISO/IEC 27000-series standards and the NIST CSF. 4 Risk analysis and management. Introduction to risk analysis: information assets and vulnerabilities. Risk analysis methods (quantitative/qualitative). Countermeasures and mitigation; residual risk. IT emergency and disaster management. Risk and effectiveness assessment metrics: RPO, RTO. Incident Response and Business Continuity plan. Backup techniques and policies. 5 Process certification. Introduction to security certifications. The PDCA process. Structure and objectives of an ISMS. ISO 27002 control points. Case study exercise: auditing a process. 6 Digital Forensic Analysis: Techniques and methods of digital forensic analysis (computers, mobile devices, cloud, networks). The main HD and SW analysis tools. Analysis of non-standard digital devices. Cyber Triage. Antiforensics. |
| Obiettivi Agenda 2030 per lo sviluppo sostenibile | Quality Education Industry, innovation, and infrastructure Sustainable cities and communities |
DIGITAL FORENSICS
| Code | A003522 |
|---|---|
| CFU | 2 |
| Teacher | Filippo Bianchini |
| Teachers |
|
| Hours |
|
| Learning activities | Affine/integrativa |
| Area | Attività formative affini o integrative |
| Sector | INF/01 |
| Type of study-unit | Opzionale (Optional) |
| Language of instruction | English |
| Contents | 1 Information Security policies Information security standards and certification process 2 Product certification and Common Criteria ISO/IEC 15408 3 Cybersecurity: regulations, laws, and agencies shaping the cybersecurity landscape 4 Risk analysis and management 5 Process certification and ISO27001 ISO 27002 6 Business Continuity and Disaster recovery 7 Digital and Computer Forensics |
| Reference texts | All the reference material is available http://unistudium.unipg.it (ISO standard ISO are available for consultation on request). Lecture notes, slides and handouts. Auditing guidelines. Documents describing Common Criteria Standard and ISO 2700* standards and recommendations from AgID and ENISA. Training materials for points 1, 2 and 3 available on the ItalianCyberTeam.it website: https://italiancyberteam.it/dim-dipartimento-informatica/ |
| Educational objectives | Knowledge of the main issues in IT security. Knowledge of the main standards for product and process IT security. Knowledge of the principles and technological foundations of computer forensics. Knowledge of key software vulnerabilities and best practices for secure programming Ability to analyze and evaluate aspects of an IT product/process in relation to security issues and their certification. Knowledge of the main local and international infrastructures for the implementation of monitoring and response services for security criticalities. Ability to understand and perform digital forensic activities (computer, mobile, cloud, network, cybertriage) according to UNI ISO guidelines. |
| Prerequisites | Basic prerequisites for effective understanding of the course topics: general knowledge of the main topics related to information and communication technologies and knowledge of object-oriented and non-object-oriented programming languages, issues related to database concurrency, and software engineering. Knowledge of the basics of computer systems, database management systems, networks, and the web. Knowledge of basic programming elements in a programming language. Basic concepts of computer security. Knowledge of the file systems of the main Operating Systems. |
| Teaching methods | Lectures. Discussion of case studies. Seminars by experts. Flipped Lessons. Presentation of students' ongoing reports (exemptions). Final project. |
| Other information | Classes timetable and exams schedule at http://www.informatica.unipg.it and http://www.dmi.unipg.it/didattica/corsi-di-studio-in-informatica/informatica-magistrale The digital forensic classes will also host seminars from professional expert in the field. |
| Learning verification modality | Written Final Examination and final project for students non attending the course. Continuous assessment with assignments and projects for students attending the course. Continuous assignment consisting in students report presentation. Final project will be on assigned topic about information security/digital forensic. For information on support services for students with disabilities and/or SLDs, visit http://www.unipg.it/disabilita-e-dsa |
| Extended program | Programme: 1 Certification, organisations, basic concepts, Management Systems, HSL, Audit vs Assessment, how an audit is carried out, ISO 17021, 17011, scenario simulations. The main certification bodies in Italy. Certification of auditor personnel. 2 Product certification: ISO/IEC 15408 Common Criteria certification: General structure, Target of Evaluation, Security Target (components of a security target, security requirement rationale, etc.). Security Function Classes and Assurance Classes, structure (classes, families, components, dependencies) and meaning. EAL assurance levels. Protection Profiles. Case study exercise on CC-certified product. 3 Cybersecurity: regulations, laws, and agencies shaping the cybersecurity landscape: ACN, ENISA, NCSF 2.1, NIS2, CSF 1.1 to CSF 2.0, ENISA, and the mapping/conversion between ISO/IEC 27000-series standards and the NIST CSF. 4 Risk analysis and management. Introduction to risk analysis: information assets and vulnerabilities. Risk analysis methods (quantitative/qualitative). Countermeasures and mitigation; residual risk. IT emergency and disaster management. Risk and effectiveness assessment metrics: RPO, RTO. Incident Response and Business Continuity plan. Backup techniques and policies. 5 Process certification. Introduction to security certifications. The PDCA process. Structure and objectives of an ISMS. ISO 27002 control points. Case study exercise: auditing a process. 6 Digital Forensic Analysis: Techniques and methods of digital forensic analysis (computers, mobile devices, cloud, networks). The main HD and SW analysis tools. Analysis of non-standard digital devices. Cyber Triage. Antiforensics. |
| Obiettivi Agenda 2030 per lo sviluppo sostenibile | Quality Education Industry, innovation, and infrastructure Sustainable cities and communities |