Administrative information
Lecturer | Prof. D. Palma |
---|---|
Credits | 6 ECTS |
Contact hours | 48 hours |
Teaching period | Second semester |
---|---|
Level | Postgraduate |
Scientific sector | ING-INF/05 |
Postgraduate degree programme | Academic year 2025-2026
Lecturer | Prof. D. Palma |
---|---|
Credits | 6 ECTS |
Contact hours | 48 hours |
Teaching period | Second semester |
---|---|
Level | Postgraduate |
Scientific sector | ING-INF/05 |
The course aims to provide students with the theoretical and practical knowledge necessary to address the analysis, design, and implementation of secure systems in various application contexts. Initially, students will learn the fundamental concepts of cybersecurity, including the main protection services and mechanisms, threats and vulnerabilities, as well as attack and defence methodologies. Security models and protection architectures will be analysed, with a particular focus on risk management and mitigation. Subsequently, advanced defence mechanisms will be explored, including protection strategies for complex environments and emerging techniques to counter more sophisticated threats. Part of the course will focus on the theoretical and practical aspects of cryptography, which is one of the pillars of cybersecurity. The mathematical foundations of these algorithms, particularly number theory, will be explored to enable students to understand the practical and theoretical implications of the cryptographic solutions adopted in modern systems. Furthermore, part of the course will focus on the analysis and design of modern biometric systems for identity verification, as well as the related security issues. The course includes numerous practical exercises and examples, as well as a series of laboratory exercises and projects carried out in virtualised environments, which will allow students to develop practical skills in identifying and mitigating vulnerabilities.
The course is delivered in a blended e-learning format via the University of Udine's Moodle platform, with all teaching materials available online. Teaching methods include lectures, flipped classroom sessions, in-class exercises, homework assignments, and hands-on laboratory activities. Lecture recordings are available to students via Microsoft Teams.
The exam is spread over two separate days and consists of a written test, an oral examination, and a laboratory activity assigned during the course. The written test assesses theoretical knowledge, methodological understanding, and the ability to apply them to real-world problems. The oral examination and laboratory assessment will take place upon successful completion of the written test.
Attempting attacks on real systems is illegal and may lead to prosecution. All experiments must be conducted using test environments only. I do not promote malicious practices and I will not be responsible for any illegal activities.