Cybersecurity: from viruses to digital signature di Luca Libanore (luca@libanore.it), Francesco Pagano (fpagano64@alice.it)


SUBJECT: computer security, from viruses to digital signature
COURSE LENGHT: 8 hours
PUBLIC: fifth-year students of Istituto Industriale Informatico
SUBJECT AREA: information technology
Knowledge:
At the end of the course the student will be able to :
• define computer menaces
• identify safe connections (ciphered)
• identify net attacks
• to provide defence techniques
• to recognize net critical situations
Learning:
The student will learn:
• how viruses spread
• which types of attacks there are
• cryptographic techniques and state of the art
• how to make a net safe
Purposes:
At the end of the course the student will be able to:
• use safe computer communication media
• work out computer nets with safe requirements
• remove visible critical situations that might threaten net systems security
Activities in class:
The teacher will carry out the activities through traditional lectures. Topics can follow the same structure suggested by the teaching path and intensifying it with supporting material (web links).

Mappa
 
  1. INTRODUCTION
  2. MENACES
  3. - Troian horses
  4. - Viruses and worm
  5. - Spamming
  6. - Spyware
  7. - Phishing
  8. SAFETY REQUIREMENTS
  9. CRYPTOGRAPHY
  10. - Symmetric cryptography
  11. - Asymmetric cryptography
  12. -- The authentication
  13. -- Secrecy
  14. -- Key distribution
  15. - Lenght of keys
  16. NET SECURITY
  17. - Net dangers
  18. -- DoS (Denial of Service)
  19. -- Address Spoofing
  20. -- Packet Sniffing
  21. - TECHNIQUES
  22. -- Firewall
  23. -- Security protocols
  24. --- SSL
  25. -- VPN
  26. DIGITAL SIGNATURE
  27. Test
Elenco percorsi                                                                                  Edita
Edurete.org Roberto Trinchero