CYBERSECURITY
cod. 1010918

Academic year 2022/23
2° year of course - First semester
Professor
- Selene GIUPPONI
Academic discipline
Informatica (INF/01)
Field
Discipline informatiche
Type of training activity
Characterising
48 hours
of face-to-face activities
6 credits
hub:
course unit
in ITALIAN

Learning objectives

This course lays out the basic concepts and knowledge for those entering for the
first time in the world of Cyber Security.
The objective of the course is to provide the basic and advanced knowledge of Cyber Security, from theory to practice to understand the threats that can happen every day from the personal sphere to National Security.
The Course also has practical applications during classes.

Prerequisites

None.
All students even with different backgrounds can participate in this course.

Course unit content

Information Security.
Terminology, Statistics, Yesterday's Threats of Today and Future, A Little History: from Hacking to Cybercrime .
. from Cyber Espionage to Information Warfare.
Case Studies.
OSINT - Introduction to OSINT
Who uses OSINT and why
Categories of Intelligence
Open Source Intelligence Fundamentals
Course Introduction
Understanding OSINT
Goals of OSINT Collection
Diving into Collecting
Taking Excellent Notes
Determining Your Threat Profile
Setting up an OSINT Platform
Effective Habits and Process
Leveraging Search Engines
Gathering, Searching, and Analyzing OSINT
Data Analysis Challenges
Harvesting Web
Data, File Metadata Analysis
OSINT Frameworks
What and where you can look for
Engines, services and other places
Search Engines: The Basic
Google Dorks
Social Networks, Relations, Entourages, and all the Rest
Virtual Communities


Cyber Threat Intelligence
What is CTI
Threat Hunting Activities
Undercover Investigation in the Dark Web

Digital and Mobile Forensics
Computer Forensics lab, basics of File System and commands. Difference between the various ways of performing forensic acquisitions of Personal Computers.
Computer Forensics Lab, basics of Mobile Forensics, knowledge of Cellebrite Ufed 4PC tools.
Computer Forensics Lab, knowledge of paid (AXIOM) and open (AutoPsy) tools.


Key concepts of Digital Forensics.
The importance of Digital Forensics today.
The different phases of D.F.:
Identification
Acquisition and Retention
Analysis
Evaluation and presentation

Full programme

see the content part

Bibliography

http://www.opensourceintelligence.eu/ric/doc/INSCOM%20OSINT%20HB.pdf
http://www.opensourceintelligence.eu/ric/doc/The%20Extreme%20Searcher%27s%20Internet%20Handbook.pdf
http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB436/docs/EBB-005.pdf
http://www.phibetaiota.net/wp-content/uploads/2009/07/OSINT-2ool-Kit-OnThe-Go-Bag-O-Tradecraft.pdf
http://www.oss.net/dynamaster/file_archive/030201/ca5fb66734f540fbb4f8f6ef759b258c/NATO%20OSINT%20Handbook%20v1.2%20-%20Jan%202002.pdf
http://verificationhandbook.com/
https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf


http://uobrep.openrepository.com/uobrep/bitstream/10547/326231/1/hewling.pdf
http://www.cftt.nist.gov/disk_imaging.htm
https://www.academia.edu/7768658/Actionable_Evidence_in_the_Wake_of_Anti-Forensics_on_Windows_8_Systems
http://ac.els-cdn.com/S1877050914012113/1-s2.0-S1877050914012113-main.pdf?_tid=fb848980-7551-11e4-8648-00000aacb35e&acdnat=1416995750_8ff475d9db450e5724b169e154496169
https://www.guidancesoftware.com/products/Pages/tableau/products/duplicators.aspx
http://www.cftt.nist.gov/tool_catalog/index.php
https://digital-forensics.sans.org/summit-archives/2012/practical-use-of-cryptographic-hashes-in-forensic-investigations.pdf
http://www.ltr-data.se/opencode.html/#ImDisk
http://www.forensicsoft.com/index.php


http://www.e-evidence.info/
http://www.forensicswiki.org/
http://www.forensicfocus.com/
http://www.opensourceforensics.org/
http://www.nirsoft.net
http://www.tzworks.net
http://redwolfcomputerforensics.com
http://www.mitec.cz
http://www.woanware.co.uk
http://www.sysinternals.com
http://www.passwordforensics.com

http://verificationhandbook.com/book/
http://www.phibetaiota.net/wp-content/uploads/2014/01/Ben-Benavides-Social-Web-Sites-A-Guide.pdf
http://www.phibetaiota.net/2014/01/ben-benavides-exploring-social-media-web-sites-a-guide-for-the-open-source-analyst/
http://www.onstrat.com/osint/
site://www.css.ethz.ch osint
http://demosthenes.info/blog/670/The-Face-Of-Lorem-Ipsum-Profile-Generators-And-Random-User-Images
http://it.fakenamegenerator.com/gen-male-it-it.php
http://www.datafakegenerator.com/generador.php
http://simitator.com/generator/facebook
http://www.phibetaiota.net/wp-content/uploads/2013/07/2013-07-11-OSINT-2ool-Kit-On-The-Go-Bag-O-Tradecraft.pdf
http://www.wikihow.com/Reveal-a-Fake-Facebook-Account
http://www.difesaonline.it/index.php/it/15-notizie/approfondimenti/280-la-demodoxalogia-l-osint-open-source-intelligence-italiana
http://rr.reuser.biz/
https://twitter.com/OSINTCenter
http://inteltechniques.com/links.html
http://actualfacebookgraphsearches.tumblr.com/

Teaching methods

Lessons in theory, practice, workshops

Assessment methods and criteria

Practical classroom exercises and home exercises on the topics explained from time to time.

Other information

- - -