Cybersecurity: from viruses to digital signature di Luca Libanore (luca@libanore.it), Francesco Pagano (fpagano64@alice.it)


SUBJECT: computer security, from viruses to digital signature
COURSE LENGHT: 8 hours
PUBLIC: fifth-year students of Istituto Industriale Informatico
SUBJECT AREA: information technology
Knowledge:
At the end of the course the student will be able to :
define computer menaces
identify safe connections (ciphered)
identify net attacks
to provide defence techniques
to recognize net critical situations
Learning:
The student will learn:
how viruses spread
which types of attacks there are
cryptographic techniques and state of the art
how to make a net safe
Purposes:
At the end of the course the student will be able to:
use safe computer communication media
work out computer nets with safe requirements
remove visible critical situations that might threaten net systems security
Activities in class:
The teacher will carry out the activities through traditional lectures. Topics can follow the same structure suggested by the teaching path and intensifying it with supporting material (web links).

Mappa
 
  1. INTRODUCTION
  2. MENACES
  3. - Troian horses
  4. - Viruses and worm
  5. - Spamming
  6. - Spyware
  7. - Phishing
  8. SAFETY REQUIREMENTS
  9. CRYPTOGRAPHY
  10. - Symmetric cryptography
  11. - Asymmetric cryptography
  12. -- The authentication
  13. -- Secrecy
  14. -- Key distribution
  15. - Lenght of keys
  16. NET SECURITY
  17. - Net dangers
  18. -- DoS (Denial of Service)
  19. -- Address Spoofing
  20. -- Packet Sniffing
  21. - TECHNIQUES
  22. -- Firewall
  23. -- Security protocols
  24. --- SSL
  25. -- VPN
  26. DIGITAL SIGNATURE
  27. Test
Elenco percorsi                                                                                  Edita
Edurete.org Roberto Trinchero