Global Studies and EU | CYBER WARFARE
Global Studies and EU CYBER WARFARE
cod. 1222500033
CYBER WARFARE
1222500033 | |
DEPARTMENT OF MANAGEMENT & INNOVATION SYSTEMS | |
EQF7 | |
GLOBAL STUDIES AND EU | |
2022/2023 |
OBBLIGATORIO | |
YEAR OF COURSE 2 | |
YEAR OF DIDACTIC SYSTEM 2018 | |
SPRING SEMESTER |
SSD | CFU | HOURS | ACTIVITY | |
---|---|---|---|---|
INF/01 | 6 | 42 | LESSONS |
Exam | Date | Session | |
---|---|---|---|
GALDI | 07/06/2023 | SESSIONE ORDINARIA | |
GALDI | 21/06/2023 | SESSIONE ORDINARIA | |
GALDI | 05/07/2023 | SESSIONE ORDINARIA | |
GALDI | 07/09/2023 | SESSIONE DI RECUPERO |
Objectives | |
---|---|
THE COURSE AIMS TO PROVIDE STUDENTS WITH THE KNOWLEDGE AND SKILLS TO UNDERSTAND THE COMPLEX WORLD OF CYBER WARFARE. THE COURSE DEFINES THE SKILLS ALONG THREE MAIN LINES: UNDERSTANDING THE STRATEGIC ASSETS THAT LEND THEMSELVES TO ATTACKS IN THE CYBER SPHERE, UNDERSTANDING THE MOST COMMON ATTACK METHODOLOGIES AND IDENTIFYING THE EFFECTS THAT THESE ATTACKS CAN HAVE IN THE "REAL" WORLD. THE COURSE WILL ANALYZE BOTH CLASSICAL INFRASTRUCTURES SUCH AS, FOR EXAMPLE, THOSE FOR THE MANAGEMENT OF COMMUNICATIONS, ENERGY OR INDUSTRIAL PRODUCTION, AND NEW DIGITAL INFRASTRUCTURES SUCH AS FOR EXAMPLE SOCIAL NETWORKS, BLOCKCHAIN PLATFORMS OR CRYPTOCURRENCIES. AT THE END OF THE COURSE, STUDENTS WILL BE ABLE TO ANALYZE REALISTIC OPERATIONAL CONTEXTS, HIGHLIGHTING CYBER THREATS THAT NEED TO BE TAKEN INTO ACCOUNT AND DESCRIBING POSSIBLE TECHNOLOGICAL SOLUTIONS THAT ARE ABLE TO COUNTER THEM. |
Prerequisites | |
---|---|
BASIC KNOWLEDGE OF COMPUTER SCIENCE. ABSTRACTION CAPABILITIES WILL BE USEFUL TO IDENTIFY FUNDAMENTAL DATA THAT INFLUENCE A GIVEN PHENOMENON. |
Contents | |
---|---|
A SINGLE MODULE OF 42 HOURS. - INFORMATION SECURITY. TECHNIQUES AND TOOLS FOR DATA PROTECTION. INTRODUCTION TO CYBER WARFARE. (10 HOURS CLASS LECTURES) HISTORY OF CYBER ATTACKS. ATTACK TYPES AND TOOLS. CENTRALIZED AND DISTRIBUTED ATTACKS. ADVERSARY TAXONOMY. (10 HOURS CLASS LECTURES) - CYBER ATTACKS AS TOOLS FOR INDUSTRIAL ESPIONAGE. ILLEGAL ACQUISITION INTELLECTUAL PROPERTY. CYBER EXPLOITATION. USE OF SOCIAL NETWORKS IN CYBER WARFARE. (8 HOURS CLASS LECTURES) - CYBER ATTACKS TO CRITICAL INFRASTRUCTURES. ATTACKS TO INDUSTRIAL SYSTEMS, DATA/POWER NETWORKS, POWER PLANTS. (4 HOURS CLASS LECTURES) - CYBER ATTACKS TO SOCIAL. FAKE NEWS, DEEP FAKE, ELECTORAL CAMPAIGNS. (4 HOURS CLASS LECTURES) - CRYPTOGRAPHIC PRIMITIVES AND THEIR APPLICATIONS. NEW TECHNOLOGIES IN ECONOMY: BLOCKCHAIN AND CRYPTO CURRENCIES. (6 HOURS CLASS LECTURES) |
Teaching Methods | |
---|---|
THE COURSE CONSISTS OF 42 HOURS OF THEORETICAL LECTURES |
Verification of learning | |
---|---|
THE EXAMS CONSISTS OF A PROJECT WORK DEVELOPER DURING THE COURSE AND OF A FINAL ORAL EXAMINATION. STUDENTS WILL BE EVALUATED BY USING A SCALE OF 30. FINAL SCORE DEPENDS ON 50% PROJECT WORK AND 50% ORAL EXAMINATION. THE PROJET WORK WILL EVALUATE THE ABILITY TO ANALYZE, DEVELOP OR USE ATTACK/DEFENCE SYSTEMS ANALIZED DURING THE LECTURES |
Texts | |
---|---|
PAULO SHAKARIAN, JANA SHAKARIAN, ANDREW RUEF INTRODUCTION TO CYBER-WARFARE: A MULTIDISCIPLINARY APPROACH ELSEVIER |
More Information | |
---|---|
NONE |
BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2023-05-23]