Study-unit FORENSIC COMPUTER SCIENCE

Course name Investigation and security sciences
Study-unit Code GP004296
Curriculum Comune a tutti i curricula
Lecturer Emanuele Florindi
Lecturers
  • Emanuele Florindi
Hours
  • 36 ore - Emanuele Florindi
CFU 6
Course Regulation Coorte 2022
Supplied 2022/23
Supplied other course regulation
Learning activities Affine/integrativa
Area Attività formative affini o integrative
Sector INF/01
Type of study-unit Obbligatorio (Required)
Type of learning activities Attività formativa monodisciplinare
Language of instruction Italian
Contents Theory of Information security and Digital Forensics.
Reference texts E.Florindi, Deep web. Vizi privati e pubbliche virtù della navigazione in rete, Lindau editore, 2020
Educational objectives At the end of the course the students will have knowledge of Computer Science required for the Digital Forensic.
Main knowledge acquired will be:
- Knowledge of basic computer science topics
- Elements of computer security and cryptography
- Investigative analyzes
Prerequisites None
Teaching methods The course is organized as follows:
- Lectures on all subjects of the course;
- Classroom exercises.
Other information Place of lessons
Narni, Piazza Galeotto Marzio

Consult the schedule of lessons and exams from the Department website, http://www.fissuf.unipg.it/didattica
Learning verification modality The exam includes only the final oral test consisting of a discussion-interview on the topics discussed during the course and examined in-depth through recommended texts.The test aims at assuring the level of knowledge and understanding, as well as synthesis, achieved by the student. Moreover, this interview will verify that the student is able to communicate, with method, propriety of language and of exposure, what he has acquired. The duration of the test varies depending on the performance of the test itself.
Extended program - Scientific evidence in the process (civil and criminal)
- Computer forensics: procedural outlines and analysis experiences
- Evolution of the concept of computer crime and focus on the following crimes:
* Illegal access: from portascanning to wardriving;
Protection of access codes;
Protection of communications with particular regard to issues related to network administration and defensive activities;
Computer damage and viruses;
Crimes against honour;
Scam and computer fraud: phishing & co;
Internet and pedophilia;
Cyberlaudering;
The protection of confidentiality;

- Computer security
- symmetric and asymmetric encryption
- digital signature
- steganography.
- OSINT;
- Bullying and cyberbullying
- Deep web and dark net