First cycle
degree courses
Second cycle
degree courses
Single cycle
degree courses
School of Science
Course unit
SCP6076342, A.A. 2019/20

Information concerning the students who enrolled in A.Y. 2018/19

Information on the course unit
Degree course Second cycle degree in
SC2377, Degree course structure A.Y. 2017/18, A.Y. 2019/20
bring this page
with you
Number of ECTS credits allocated 6.0
Type of assessment Mark
Course unit English denomination COMPUTER AND NETWORK SECURITY
Website of the academic structure
Department of reference Department of Mathematics
Mandatory attendance No
Language of instruction English
Single Course unit The Course unit can be attended under the option Single Course unit attendance
Optional Course unit The Course unit can be chosen as Optional Course unit

Teacher in charge MAURO CONTI INF/01

Course unit code Course unit name Teacher in charge Degree course code

ECTS: details
Type Scientific-Disciplinary Sector Credits allocated
Core courses INF/01 Computer Science 6.0

Course unit organization
Period First semester
Year 2nd Year
Teaching method frontal

Type of hours Credits Teaching
Hours of
Individual study
Lecture 6.0 48 102.0 No turn

Start of activities 30/09/2019
End of activities 18/01/2020
Show course schedule 2019/20 Reg.2017 course timetable

Examination board
Board From To Members of the board
3 a.a. 2018/2019 01/10/2018 28/02/2020 CONTI MAURO (Presidente)
MARCHIORI MASSIMO (Membro Effettivo)
CRAFA SILVIA (Supplente)
FILE' GILBERTO (Supplente)

Prerequisites: No strict prerequisites on previous exams.
However, it is suggested to have basic knowledge of networking, cryptography, and distributed systems (typically acquired in BSc degrees in Computer Science).
Target skills and knowledge: Examining in depth the basic security concepts, with an analysis of the most recent research proposals in the field. At the end of the course, students will be able not only to critically analyze a software system as a whole, but also to independently update their skills in the field, through recent research results in the area.
Examination methods: Project with written essay + oral exam.
Assessment criteria: Knowledge of the concepts studied during the course.
Course unit contents: Theory: RFID security, captcha, untrusted storage, smartphone security, attacks on smartphone, password protection, distributed Denial of Service attacks, deep learning, behavioural biometrics, VoIP security, secure content delivery, anonymous communications, keyloggers detection, anonymity in WSN, botnet detection, trusted HW, security of RFID ePassports, node replication attack in WSN, secure data aggregation in WSN, privacy issues in social networks, Google Android smartphone security, electronic voting, P2P botNet detection, taint mechanisms, browser security, privacy of location based services, Named Data Networking security, Named Data Networking privacy, cloud security, anonymity in wireless network, smartphone user profiling, SSL security issues in Android, circumvent censorship, secure messaging, operational technology security, cyber-physical systems security
Laboratory: advanced security tools, including: traffic analysis with machine learning tools, data inference, Android security tools, advanced analysis of malware systems and advanced persistent threat; web security; social network analysis tools, trusted platform modules.
Planned learning activities and teaching methods: Lectures; discussion of scientific papers.
Additional notes about suggested reading: Book (main book: Computer Security: Principles and Practice 2/E) and scientific papers.

The course will be given in English.
The web site of the course will offer all the information and additional material:
Textbooks (and optional supplementary readings)
  • W. Stallings, L. Brown, Computer Security: Principles and Practice 2/E. --: Prentice Hall, --. Cerca nel catalogo
  • M. Bishop, Introduction to Computer Security. --: Addison-Wesley Professional, --. Cerca nel catalogo

Innovative teaching methods: Teaching and learning strategies
  • Lecturing
  • Laboratory
  • Problem based learning
  • Case study
  • Interactive lecturing
  • Working in group
  • Questioning
  • Flipped classroom
  • Peer feedback
  • Use of online videos
  • Loading of files and pages (web pages, Moodle, ...)
  • Students peer review

Innovative teaching methods: Software or applications used
  • Moodle (files, quizzes, workshops, ...)
  • Latex

Sustainable Development Goals (SDGs)
Industry, Innovation and Infrastructure