Fundamentals of digital social media

A.Y. 2020/2021
Overall hours
Learning objectives
The course aims at introducing digital social media to the students. The course covers the web technologies which support online social interactions, the tools supporting the gathering and the analysis of data generated by social platforms. Moreover the course will introduce the security analysis of the main technologies used in the social media context such as cryptographic protocols (e.g., SSL and HTTPS) and the communication protocol such as the web.
Expected learning outcomes
The student should be able to apply the tools illustrated in the course to gather the data generated by digital social media, by identifying the most suitable solutions according to the web technologies used by the social platforms. Moreover, the student should be able to apply cryptographic schemes by using crypto tools like for example gpg and security anayzed communication protocol such as https, ssl and web.
Course syllabus and organization

Single session

Lesson period
Second semester
In the emergency phase, teaching will be entirely carried out in synchronous on-line mode using the ZOOM platform. The same is true for carrying out the verification tests that will be carried out with the platform.
Course syllabus
The course is logically splitted in two parts: the first part will address the general theme of IT security while the second part will contextualize the topics addressed in the first part in the field of Social Media. In more detail these are the topics that will be covered in the course:
- Introduction to Information Security
- The protection mechanisms of a system
- Identification & authentication
- Authorization
- Audit
- The main forms of attack
- exploit
- malware
- network attacks
- WEB attacks
- Cross Request Forgery
- Cross site Scripting
- Sql Injection (elements of)
- Elements of Privacy and data protection
- Introduction to Social Media
- the main threats
- Identity theft
- Phishing
- Spam
- Privacy invasion
- Social Media and participatory democracy
- Electronic voting
- Case study: the Decidim platform
Prerequisites for admission
The Prerequisite for this course are:

1 - Networking Course
2 - Programming Course
Teaching methods
The course will be held with classical style, even if delivered online. Some theory lessons will alternate with some exercises that will be an integral part of the course program and the final test.
Teaching Resources
Security in Computing (5th Edition)
Authors: Charles P Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Publisher: Prentice Hall Press
Pages: 944
Handouts or articles on specific topics will also be made available to students and distributed during the course.
Assessment methods and Criteria
the final exam will consist of a questionnaire with open answers. The number of questions may vary from 6 to 10. Answers will be evaluated on the basis of accuracy, completeness and clarity of exposition. Each correct answer will be awarded up to 3 - 5 points depending on the number of questions that make up the test.
INF/01 - INFORMATICS - University credits: 6
Lessons: 48 hours
send an email to danilo[dot]bruschi[at]unimi[dot]it
Room P115, Via Comelico