User Tools

Site Tools


bachelor

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
bachelor [2017/10/19 13:30] rootbachelor [2021/01/10 21:04] (current) – external edit 127.0.0.1
Line 16: Line 16:
   * 3USU0: Course 2 Information science technology and society (Security track)   * 3USU0: Course 2 Information science technology and society (Security track)
     * This course is divided into two parts: complex networks (part I) and information security (part II).     * This course is divided into two parts: complex networks (part I) and information security (part II).
-      *  The goal of this part of the course is to introduce students to the state of the art in terms of argumentation, models, and algorithms developed for understanding complex networks of humans and devices. +      *  The goal of the first part of the course is to introduce students to the state of the art in terms of argumentation, models, and algorithms developed for understanding complex networks of humans and devices. 
-      * Concepts of information risk, threats, vulnerabilities, impact; confidentiality, integrity, authenticity. Shannon’s communication model for conventional encryption. Symmetric and asymmetric cryptography, randomness in key generation and encryption. Cryptographic attacks. Physical random number generators and Physical Unclonable Functions (PUFs)Algorithms for turning non-uniform physical sources of randomness into uniform sources. Randomness tests. Uses of PUFs. Infection mechanisms and dynamics. Malware: viruses, botnets, and ransomware. The economics of the exploits market: criminal business models. Life cycle of exploits. Examples of exploits. Study of the Russian black market and traded technology. (Da sistemare)+      * The goal of the second part is to introduce the concepts of information risk, threats, vulnerabilities, impact; confidentiality, integrity, authenticity. Shannon’s communication model for conventional encryption. Cryptography and cryptographic attacks. Physical random number generators and Physical Unclonable Functions. Malwares and Exploits. Study of the Russian black market and traded technology.
bachelor.1508412647.txt.gz · Last modified: 2021/01/10 20:59 (external edit)