Study-unit FORENSIC COMPUTER SCIENCE

Course name Investigation and security sciences
Study-unit Code GP004296
Curriculum Comune a tutti i curricula
Lecturer Roberto Orazi
Lecturers
  • Roberto Orazi
Hours
  • 36 ore - Roberto Orazi
CFU 6
Course Regulation Coorte 2021
Supplied 2021/22
Supplied other course regulation
Learning activities Affine/integrativa
Area Attività formative affini o integrative
Sector INF/01
Type of study-unit Opzionale (Optional)
Type of learning activities Attività formativa monodisciplinare
Language of instruction Italian
Contents Theory of Information security and Digital Forensics.
Reference texts A. Cecchi - R. Orazi, Informatica e crittografia attraverso gli esercizi. Una metodologia e una pratica didattica, Liguori Editore, 2009

A. Contaldo - F. Peluso, E-detective. L'informatica giuridica e le applicazioni della digital forensics, PMEDIZIONI, 2018.

E-BOOK.
Riccardo Rizzo, La sicurezza informatica, StreetLib, 2017
Educational objectives At the end of the course the students will have knowledge of Computer Science required for the Digital Forensic.
Main knowledge acquired will be:
- Knowledge of basic computer science topics
- Elements of computer security and cryptography
- Investigative analyzes
Prerequisites None
Teaching methods The course is organized as follows:
- Lectures on all subjects of the course;
- Classroom exercises on algorithms and cryptography preceded by a classroom presentation lesson.
Other information Place of lessons
Narni, Piazza Galeotto Marzio

Consult the schedule of lessons and exams from the Department website, http://www.fissuf.unipg.it/didattica
Learning verification modality The exam includes only the final oral test consisting of a discussion-interview on the topics discussed during the course and examined in-depth through recommended texts.The test aims at assuring the level of knowledge and understanding, as well as synthesis, achieved by the student. Moreover, this interview will verify that the student is able to communicate, with method, propriety of language and of exposure, what he has acquired. The duration of the test varies depending on the performance of the test itself.
Extended program Information security, the concept of information system, computer security, Cryptography - symmetric and asymmetric, digital signatures and steganography. Algorithms and a family of general-purpose high-level programming languages. Digital Forensics.