Skip to Main Content (Press Enter)

Logo UNINSUBRIA
  • ×
  • Home
  • Degrees
  • Courses
  • Jobs
  • People
  • Outputs
  • Organizations
  • Third Mission
  • Projects
  • Expertise & Skills

UNI-FIND
Logo UNINSUBRIA

|

UNI-FIND

uninsubria.it
  • ×
  • Home
  • Degrees
  • Courses
  • Jobs
  • People
  • Outputs
  • Organizations
  • Third Mission
  • Projects
  • Expertise & Skills
  1. Courses

SCV0317 - FUNDAMENTALS OF DATA SECURITY

courses
ID:
SCV0317
Duration (hours):
48
CFU:
6
SSD:
INFORMATICA
Located in:
Varese - Università degli Studi dell'Insubria
Year:
2025
  • Overview
  • Syllabus
  • Degrees
  • People

Overview

Date/time interval

Primo Semestre (22/09/2025 - 19/12/2025)

Syllabus

Course Objectives

The course aims to provide basic knowledge for the design and verification of mechanisms for data protection in information systems and networks.
The objective is achieved by discussing, first, the basic concepts of cryptography. This involves the study of the basic transformations used in symmetric encryption as well as of the most relevant symmetric encryption algorithms (e.g., DES, AES). This part of the course is also devoted to the study of asymmetric encryption, by discussing the most widely used asymmetric algorithm, i.e., RSA.
Data protection during transmission is then analyzed by presenting protocols at different network layers: IPSec to protect data at the network layer, SSL for data protection at the transport layer, and Kerberos as an example of application layer protocol. This will provide the student with the ability to identify criticisms of each protocol, which is a piece of essential knowledge in order to design of data protection system.
The course is also aimed at providing the basics of access control systems. This is achieved by analyzing the access control mechanism in place at DBMS by the SQL ANSI standard. Through the course, references to current NIST (e.g., AES, DES, RBAC), IETF (e.g., IPsec, SSL / TLS), W3C (e.g., XML signature), ISO / EIC standards (e.g., SQL standard) will be provided to students in order to improve their independent judgment and critical evaluation.
The course aims at analyzing how the target security tools are applied in information systems. For example, students will learn how symmetric and asymmetric encryption algorithms are used in accordance with the standard NIST. They will learn the two most relevant applications of asymmetric encryption, that is, the digital signature and digital envelope. In particular, it will be presented how digital signature is encoded according to the W3C XML signature standards.
The study of DBMS access control mechanism makes student able to understand how to exploit SQL commands for data protection. It is expected that at the end of the course the student is able to independently define the access permissions for relations and views in the DBMS.
At the end of the course, students will be able to
O1. Know the cryptography principles, the fundamentals of network security protocols, and access control mechanisms. This knowledge will provide students with a robust basis that will allow them to learn independently new security-related mechanisms and protocol not analyzed through the course.
O2. judge the level of data protection provided by an information system, and to propose solutions, where necessary, exploiting the current security standards.
O3 .Know the main entities and organizations issuing standards related to protocol and mechanisms for data protection in information systems and networks. In addition, due to the adoption of existing security standards, it is expected that students acquire the terminology of data protection field.
The knowledge of standards help students to independently retrieve additional materials about the topic addressed during the course. This capability is very important as it will allow them to be always updated in a field, such as data protection, where new standards and related criticisms are published frequently.

Course Prerequisites

None

Teaching Methods

The course is organized in 48 hours of lectures. Lectures will present the conceptual and application aspects related to mechanisms for data protection in information systems and networks.

Assessment Methods

The exam consists of a written exam of 2 hours in which the student is required to respond to open questions, aimed at verifying the acquisition and proper understanding of the topics presented during the course. The final vote, out of thirty, will take into account the accuracy and quality of the responses (70%), the skill of exposure (10%) and the ability to adequately justify statements, analyzes and opinions (20%).

Contents

The course is organized in 48 hours of lectures, organized as follows: Introduction to security concepts. Lecture, 2h (02,03);
Analysis of classical encryption: substitution and transposition. Lecture, 4h (01,02);
Symmetric encryption: DES algorithm. Lecture, 4h (01,02,03);
Symmetric encryption: AES algorithm. Lecture, 3h (01,02,03);
Asymmetric encryption: RSA algorithm. Lecture, 3h (01,02,03);
Asymmetric encryption applications: digital signature and digital envelope. Lecture, 5h; Digital certificates (X.509, web of trust); Lecture, 3h (01,02,03);
Data protection at the network level: IPSEC. Lecture, 6h (01,02,03);
Data protection at the transport level: SSL. Lecture, 6h (01,02,03);
Data protection at the application level: Kerberos. Lecture, 6h (01,02,03);
Access control mechanism in DBMS using ANSI SQL standard. Lecture, 6h (01,02,03).

Course Language

Italian

More information

Teacher is available on student requests.

Degrees

Degrees

COMPUTER SCIENCE 
Bachelor’s Degree
3 years
No Results Found

People

People

CARMINATI BARBARA
Settore INFO-01/A - Informatica
PE6_10 - Web and information systems, data management systems, information retrieval and digital libraries, data fusion - (2024)
Gruppo 01/INFO-01 - INFORMATICA
AREA MIN. 01 - Scienze matematiche e informatiche
PE6_5 - Security, privacy, cryptology, quantum cryptography - (2024)
Docenti di ruolo di Ia fascia
No Results Found
  • Accessibility
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.4.5.0