93466 - FONDAMENTI DI CYBERSECURITY

Academic Year 2022/2023

  • Docente: Davide Berardi
  • Credits: 6
  • SSD: INF/01
  • Language: Italian
  • Moduli: Davide Berardi (Modulo 1) Riccardo Treglia (Modulo 2)
  • Teaching Mode: Traditional lectures (Modulo 1) Traditional lectures (Modulo 2)
  • Campus: Bologna
  • Corso: First cycle degree programme (L) in Computer Science (cod. 8009)

Learning outcomes

The objective of the course is to present the theory, mechanisms, techniques and tools that are effective in increasing the security of a computer system. At the end of the course, the student will be familiar with the mathematical foundations of modern cryptography, authentication, authorization and access control mechanisms that are suitable for achieving confidentiality, integrity and availability of computer systems. The student will also acquire the knowledge necessary to assess the potentials and limitations of current technologies.

Course contents

    • Vulnerability Assessment
    • Penetration testing
    • TOR / Dark Web
    • OSINT / Data Leak
    • SDR and radio attacks
    • One-time pad
    • Stream Ciphers
    • Pseudo Random Generators
    • Real-World Stream Ciphers
    • Wifi network security
    • Cryptographic Systems with secret key
    • Cryptographic Systems with public key
    • DES
    • AES
    • RSA Digital Signatures
    • Public-key infrastructures
    • Reverse engineering
    • PWN
    • Hardware Hacking

Readings/Bibliography

  • Computer Security: Principles and Practice (4th Edition), Stallings and Brown, Pearson, 2018.
  • Computer Security: Art and Science (2nd Edition), Matt Bishop, Addison-Wesley, 2018.
  • Hacking Exposed 7: Network Security Secrets and Solutions (Hacking Exposed) 7th Edition; George Kurtz, Joel Scambray, and Stuart McClure; McGraw Hill, 2012.
  • Serious Cryptography: A Practical Introducion to Modren Encryption, Jean-Philippe Aumasson.
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce Schneier.
  • Information Security: Principles and Practice, Mark Stamp.
  • Cryptography, William Stallings
  • A Graduate Course in Applied Cryptography, Dan Boneh, Victor Shoup. (Math approach)

Teaching methods

The Course is worth 6 credits and consists of lectures together with programming exercises during the semester.

Assessment methods

The final exam for the Course aims to verify achievement of the stated objectives:

  • understanding the principal threats to security in modern computing systems
  • understanding the mathematical foundations for modern cryptography
  • understanding the benefits and limits of modern cryptographic algorithms and protocols
  • analyzing the vulnerabilities of a computing system
  • formulating a security roadmap for a modern computing system

Teaching tools

The lectures utilize overhead slides projected from a laptop computer together with a white board. The material presented during lectures will be made available in electronic format for downloading from the Course web site.

Office hours

See the website of Davide Berardi

See the website of Riccardo Treglia