This Course integrates technological skills in the area of electronics for security. Notions related to theory and implementation of cryptosystems are combined with applications of computer-security, ranging from digital signature to computer forensics. At the same time, the course also provides professional and scientific competence in the design, realization and testing of electronic systems with advanced sensor abilities.
Basic Notions in Cryptology. Algorithms and cryptosystems. Computer security Protocols (digital signature, electronic voting). Embedded electronics for security (smartcards, biometry). Cyber security and techniques for the protection of networked infrastructures, especially corporate-size. Electronics tools for computer forensics, advanced methods for intelligence.
At the end of the Course, the student will:
- acquire awareness about CyberSecurity;
- get a professional profile endowed with technical insights;
- have learned the principles and basic techniques in cryptography;
- have acquired implementation competences, including digital architectures;
- have acquired the capability to analyze service protocols such as Digital Signature, two-factor Authentication, and Electronic Vote
The learning outcomes will be verified through a battery of tests covering the whole teaching program.
Technical knowledge about digital architectures
Language C/C++
Class lessons by the Teacher.
The teaching path followed during classes allows the student to get a constant and ongoing validation of learning outcomes, by means of cross-references and interactive involvement in the various subjects encountered during the Course.
Basic Notions in Cryptology. Algorithms and cryptosystems.
Computer security Protocols (digital signature, electronic voting).
Embedded electronics for security (smartcards, biometry).
Cyber security and techniques for the protection of networked infrastructures, especially corporate-size.
Electronics tools for computer forensics, advanced methods for intelligence.
This Course deals with topics of scientific-technology interest, including the progress of electronics and cyber security in the support of Society and People, and contributes to the achievement of the following Objectives of the UN SDGs 2030:
Goal 3. Good health and well-being (data protection plays a crucial role in the area of health and personal care)
Goal 4. Quality education (the dissemination of technology skills raises the overall cultural level of modern Society)
Goal 5. Gender equality (this Course promotes a general, uniform dissemination of technological competences, in the firm belief that cyber security subjects can/should have a pervasive nature irrespectively of age, gender and any other discriminating factor)
Handouts provided by the Teacher are the basic reference, and should constantly be referred to the Course progression, which is constantly maintained updated in the AulaWeb platform.
Other possible readings:
B.Schneier, "Applied cryptography", Addison Wesley
K. Mitnick, "L'arte dell'inganno", BUR
W.Stallings "Crittografia e sicurezza delle reti", McGraw-Hill
Ricevimento: By appointment after direct contact with the Teacher rodolfo.zunino@unige.it
RODOLFO ZUNINO (President)
CHRISTIAN GIANOGLIO
EDOARDO RAGUSA
DANIELE CAVIGLIA (President Substitute)
PAOLO GASTALDO (President Substitute)
https://corsi.unige.it/8732/p/studenti-orario
Written form exam by multiple/open tests
Students with learning disorders ("disturbi specifici di apprendimento", DSA) will be allowed to use specific modalities and supports that will be determined on a case-by-case basis in agreement with the delegate of the Engineering courses in the Committee for the Inclusion of Students with Disabilities.
Particular attention will be devoted to working students, with whom the scedule of exam sessions will be agreed upon appointment and might possibly adopt special modalities that can take into account their impossibility to attend lessons.
Tests and open questions allow to verify the successful acquisition of both technical competence and design capabilities; at the same time, the exam confirms the proper acquisition of a correct awareness about the various scopes that characterize Cyber Security.
The validation of competences is certified in a progressive fashion through a selective evaluation of exam replies: - a group of baseline questions aims to verify the minimal contents required to pass the exam (18-22) - a group of reference tests aims to validate the expected average of competence and notions (23-28) - a group of challenging questions highlights the acquisition of original and high-level skills (29-30Lode)