Security risks. Threats and countermeasures.
Cybercrimine. Deep and Dark Web.
Physical and social security.Risks and vulnerabilities classification.
Digital forensics. Legal and normative aspects.Symmetric and asymmetric cryptography.
Key-exchange problems.
Key Distribution Centers approaches. Kerberos.
PKI-based approaches. CRLs and OCSP. Use of cryptography in security (e.g. authentication, confidentiality, integrity, non-repudiation).
X.509 PKI certificates.
Digital signatures.
Certified Email (PEC).
QES (Qualified Electronic Segnature). PKCS#7
Limits of cryptography. Quantum cryptography.Other uses of cryptography (e.g. blockchain).
Blockchain and Distributed Ledger.
Bitcoin and other cryptocurrencies.
Smart contracts.
Operating systems and network security.
User management and authorization.
Password and identity management.
SPID (Sistema Pubblico di Identità Digitale).TCP/IP networks.
Network attacks (spoofing, flooding, poisoning, denial of service).
Firewall and proxy.
Virtual Private Networks (VPN) using IPSec and SSL.
Web and cloud security. HTTPS.
Data security.
Backup types and strategies.
Digital preservation.
Business continuity and disaster recovery.
Privacy and user profiling.
EU GDPR (General Data Protection Regulation).
Software security.
Malicious software (virus, worm, spyware, trojan, ransomware, etc.).
Buffer overflow.
SQL injection and Cross-site scripting (XSS)
Security testing.