82114 - GIOCHI E MODELLI BOOLEANI

Academic Year 2019/2020

  • Teaching Mode: Traditional lectures
  • Campus: Bologna
  • Corso: Second cycle degree programme (LM) in Computer Science (cod. 8028)

    Also valid for Second cycle degree programme (LM) in Computer Science (cod. 8028)

Learning outcomes

The course is meant to examine the essential models, methods and topics of game theory, in terms of discrete mathematics. The first half is devoted to the fundamentals of non-cooperative games, with the final classes focused on potential and congestion games. The second half is devoted to cooperative games from a combinatorial perspective, namely in terms of lattice functions, with emphasis on coalitional games and Boolean functions.

Course contents

Understanding the Digital Forensics Profession and Investigations
The Investigator's Office and Laboratory
Data Acquisition
Processing Crime and Incident Scenes
Working with Windows and CLI Systems
Current Digital Forensics Tools
Linux and Macintosh File Systems
Recovering Graphics Files
Digital Forensics Analysis and Validation
Virtual Machine Forensics, Live Acquisitions, and Network Forensics
E-mail and Social Media Investigations
Mobile Device Forensics
Cloud Forensics
Report Writing for High-Tech Investigations
Expert Testimony in Digital Investigations
Ethics for the Expert Witness

Readings/Bibliography

Hayes D.R., A Practical Guide to Digital Forensics Investigations, Pearson, 2020.

Quenau R., Esercizi di stile, Einaudi, 2014.

 Nelson B., Philips A., Steuart C., Guide to computer forensics and investigations (6-th ed.), Cengage, 2018 

ISO/IEC 27037:2012, Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence

ISO/IEC 27041:2015, Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method 

ISO/IEC 27042:2015, Preview Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence

ISO/IEC 27043:2015 Preview, Information technology - Security techniques - Incident investigation principles and processes

Teaching methods

Lessons in aula and practice BYOD.

Assessment methods

The students are grouped together. Each group works on a case as expert either for one of the two parts or for the court. The topics have to be discussed in advance with the teacher. Each groups will produce a report. The report will be evaluated by cross-question with the other two groups. The report has to be submitted before a fixed deadline. The exam continues with an oral discussion of the main aspect of the work. The exam ends with an oral discussion on the main topics of the course.

Teaching tools

Laboratory

Office hours

See the website of Alessandro Amoroso

SDGs

Quality education Gender equality Responsible consumption and production Partnerships for the goals

This teaching activity contributes to the achievement of the Sustainable Development Goals of the UN 2030 Agenda.