The course, taught in English in the second semester of the second year of the Master of Science in Cybersecurity, is one of the characterizing courses of the Cyber Designer and Cyber Officer tracks.
The evolution of technology has brought forward new techniques to share, process and store data. This evolution has generated new models of data (including personal data) processing but has also introduced new threats and challenges. This course presents the leading techniques and methodologies for data protection and anonymization to assure user and data confidentiality and privacy. The students will learn data protection engineering with the practical implementation of technical aspects of data protection.
The course, taught in English in the second semester of the second year of the Master of Science in Cybersecurity, is one of the characterizing courses of the Cyber Designer and Cyber Officer tracks.
The evolution of technology has brought forward new techniques to share, process and store data. This evolution has generated new models of data (including personal data) processing but has also introduced new threats and challenges. This course presents the leading techniques and methodologies for data protection and anonymization to assure user and data confidentiality and privacy. The students will learn data protection engineering with the practical implementation of technical aspects of data protection.
- Knowledge of the concepts, practices, and standards for engineering data protection
- Knowledge of the technologies and methodologies for anonymization and pseudonymization
- Knowledge of the main threats and protection strategies to online privacy
- Ability to apply the learned techniques on anonymization and pseudonymization
- Ability to operate and configure the Identity and Access Management
- Ability to apply the learned techniques on protection strategies to online privacy
Students will build up knowledge (at a different level of depth based on the topic), skills and a deep understanding of mechanisms and motivations underlying the following technologies and solutions:
- Knowledge of the concepts, practices, and standards for engineering data protection
- Knowledge of the technologies and methodologies for anonymization and pseudonymization
- Knowledge of the main threats and protection strategies to online privacy
- Ability to apply the learned techniques on anonymization and pseudonymization
- Ability to operate and configure the Identity and Access Management
- Ability to apply the learned techniques on protection strategies to online privacy
Knowledge about computer networks and cloud systems as obtained in a bachelor's degree (Laurea) in computer engineering and in the first module of the course "Computer networks and cloud technologies".
Knowledge about fundamental aspects of cybersecurity as provided by the courses "Information System Security", such us security definitions and properties, the main category of attacks (sniffing, spoofing, DOS, etc.), basic terminology of network security (secure communication, firewall, IDS, IPS).
Knowledge about computer networks and cloud systems as obtained in a bachelor's degree (Laurea) in computer engineering and in the first module of the course "Computer networks and cloud technologies".
Knowledge about fundamental aspects of cybersecurity as provided by the courses "Information System Security", such as security definitions and properties, the main category of attacks (sniffing, spoofing, DOS, etc.), basic terminology of network security (secure communication, firewall, IDS, IPS).
- Overview of Data Protection and Information Privacy Governance and Management (1.25 CFU)
• Data protection by design to data protection engineering
• Privacy Threat Taxonomy and Model
• Data and Privacy Risk Management
- Technical Security Controls on Information Systems (0.75 CFU)
• System Access Concepts
• Access Control Policies Policy
• Identity and Access Management
- Privacy Enhancing Technologies in Information Systems (2 CFU)
• Anonymization and Pseudonymization
• Re-Identification Attacks
• Privacy-preserving data storage and publishing
• Synthetic Data generation techniques
- Privacy Enhancing Technologies in Online Ecosystem (2 CFU)
• Web Application Privacy
• Tracking
• Cloud Privacy
• IoT Privacy
- Overview of Data Protection and Information Privacy Governance and Management (1.25 CFU)
• Data protection by design to data protection engineering
• Privacy Threat Taxonomy and Model
• Data and Privacy Risk Management
- Technical Security Controls on Information Systems (0.75 CFU)
• System Access Concepts
• Access Control Policies Policy
• Identity and Access Management
- Privacy Enhancing Technologies in Information Systems (2 CFU)
• Anonymization and Pseudonymization
• Re-Identification Attacks
• Privacy-preserving data storage and publishing
• Synthetic Data generation techniques
- Privacy Enhancing Technologies in Online Ecosystem (2 CFU)
• Web Application Privacy
• Tracking
• Cloud Privacy
• IoT Privacy
The course consists mainly of classroom lectures. These are complemented by supervised classroom exercise sessions in which students can apply the concepts learned during the lectures to realistic use cases and discuss them with the instructor. Finally, for a subset of the topics, the course includes lab sessions to help retain the concepts learned during the lectures by observing the related technologies in action.
Specifically, the course is structured into lectures in the classroom for 4.5 credits and laboratories for 1.5 credits.
The course consists mainly of classroom lectures. These are complemented by supervised classroom exercise sessions in which students can apply the concepts learned during the lectures to realistic use cases and discuss them with the instructor. Finally, for a subset of the topics, the course includes lab sessions to help retain the concepts learned during the lectures by observing the related technologies in action.
Specifically, the course is structured into lectures in the classroom for 4.5 credits and laboratories for 1.5 credits.
The teachers will provide the material (copy of slides and links to online resources) on the course website.
The teachers will provide the material (copy of slides and links to online resources) on the course website.
Slides; Libro di testo; Esercitazioni di laboratorio; Video lezioni dell’anno corrente;
Lecture slides; Text book; Lab exercises; Video lectures (current year);
Modalità di esame: Prova scritta in aula tramite PC con l'utilizzo della piattaforma di ateneo;
Exam: Computer-based written test in class using POLITO platform;
...
The exam consists of a written test that may include open-answer and closed-answer questions or exercises to check that the student has acquired the expected knowledge and skills (see expected learning outcomes). For the part about skills, the questions may be simple exercises or use cases related to the tools experimented with in the laboratories.
The maximum grade of the test is 30/30, and the total duration, as measured by the Exams platform, which includes the setup time, is 1 hour and 30 minutes. The test is closed-book, i.e., the student cannot consult any material during the test or use any electronic device except the PC used for the test.
A sample exam test will be available to the students through the Exercise platform.
A mark on the written test larger than or equal to 25/30 will give the student the right to take an optional integrative oral test. The oral test allows the student to obtain up to 30L.
Alternatively to the oral test, the student can develop individual homework about one of the course's topics, delivering a written report followed by an oral presentation. The report and the oral presentation are evaluated up to 30L/30.
Gli studenti e le studentesse con disabilità o con Disturbi Specifici di Apprendimento (DSA), oltre alla segnalazione tramite procedura informatizzata, sono invitati a comunicare anche direttamente al/la docente titolare dell'insegnamento, con un preavviso non inferiore ad una settimana dall'avvio della sessione d'esame, gli strumenti compensativi concordati con l'Unità Special Needs, al fine di permettere al/la docente la declinazione più idonea in riferimento alla specifica tipologia di esame.
Exam: Computer-based written test in class using POLITO platform;
The exam consists of a written test that may include open-answer and closed-answer questions or exercises to check that the student has acquired the expected knowledge and skills (see expected learning outcomes). For the part about skills, the questions may be simple exercises or use cases related to the tools experimented with in the laboratories.
The maximum grade of the test is 30/30, and the total duration, as measured by the Exams platform, which includes the setup time, is 1 hour and 30 minutes. The test is closed-book, i.e., the student cannot consult any material during the test or use any electronic device except the PC used for the test.
A sample exam test will be available to the students through the Exercise platform.
A mark on the written test larger than or equal to 25/30 will give the student the right to take an optional integrative oral test. The oral test allows the student to obtain up to 30L.
Alternatively to the oral test, the student can develop individual homework about one of the course's topics, delivering a written report followed by an oral presentation. The report and the oral presentation are evaluated up to 30L/30.
In addition to the message sent by the online system, students with disabilities or Specific Learning Disorders (SLD) are invited to directly inform the professor in charge of the course about the special arrangements for the exam that have been agreed with the Special Needs Unit. The professor has to be informed at least one week before the beginning of the examination session in order to provide students with the most suitable arrangements for each specific type of exam.