Fundamentals of Digital Social Media
A.Y. 2020/2021
Learning objectives
The course aims at introducing digital social media to the students. The course covers the web technologies which support online social interactions, the tools supporting the gathering and the analysis of data generated by social platforms. Moreover the course will introduce the security analysis of the main technologies used in the social media context such as cryptographic protocols (e.g., SSL and HTTPS) and the communication protocol such as the web.
Expected learning outcomes
The student should be able to apply the tools illustrated in the course to gather the data generated by digital social media, by identifying the most suitable solutions according to the web technologies used by the social platforms. Moreover, the student should be able to apply cryptographic schemes by using crypto tools like for example gpg and security anayzed communication protocol such as https, ssl and web.
Lesson period: Second semester
Assessment methods: Esame
Assessment result: voto verbalizzato in trentesimi
Single course
This course cannot be attended as a single course. Please check our list of single courses to find the ones available for enrolment.
Course syllabus and organization
Single session
Responsible
Lesson period
Second semester
In the emergency phase, teaching will be entirely carried out in synchronous on-line mode using the ZOOM platform. The same is true for carrying out the verification tests that will be carried out with the exam.net platform.
Course syllabus
The course is logically splitted in two parts: the first part will address the general theme of IT security while the second part will contextualize the topics addressed in the first part in the field of Social Media. In more detail these are the topics that will be covered in the course:
PART I
- Introduction to Information Security
- The protection mechanisms of a system
- Identification & authentication
- Authorization
- Audit
- The main forms of attack
- exploit
- malware
- network attacks
- WEB attacks
- Cross Request Forgery
- Cross site Scripting
- Sql Injection (elements of)
- Elements of Privacy and data protection
PART II
- Introduction to Social Media
- the main threats
- Identity theft
- XSS
- Phishing
- Spam
- Privacy invasion
- Social Media and participatory democracy
- Electronic voting
- Case study: the Decidim platform
PART I
- Introduction to Information Security
- The protection mechanisms of a system
- Identification & authentication
- Authorization
- Audit
- The main forms of attack
- exploit
- malware
- network attacks
- WEB attacks
- Cross Request Forgery
- Cross site Scripting
- Sql Injection (elements of)
- Elements of Privacy and data protection
PART II
- Introduction to Social Media
- the main threats
- Identity theft
- XSS
- Phishing
- Spam
- Privacy invasion
- Social Media and participatory democracy
- Electronic voting
- Case study: the Decidim platform
Prerequisites for admission
The Prerequisite for this course are:
1 - Networking Course
2 - Programming Course
1 - Networking Course
2 - Programming Course
Teaching methods
The course will be held with classical style, even if delivered online. Some theory lessons will alternate with some exercises that will be an integral part of the course program and the final test.
Teaching Resources
Security in Computing (5th Edition)
Authors: Charles P Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Publisher: Prentice Hall Press
ISBN:978-0-13-408504-3
Pages: 944
Handouts or articles on specific topics will also be made available to students and distributed during the course.
Authors: Charles P Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Publisher: Prentice Hall Press
ISBN:978-0-13-408504-3
Pages: 944
Handouts or articles on specific topics will also be made available to students and distributed during the course.
Assessment methods and Criteria
the final exam will consist of a questionnaire with open answers. The number of questions may vary from 6 to 10. Answers will be evaluated on the basis of accuracy, completeness and clarity of exposition. Each correct answer will be awarded up to 3 - 5 points depending on the number of questions that make up the test.
INF/01 - INFORMATICS - University credits: 6
Lessons: 48 hours
Professors:
Bruschi Danilo Mauro, Zignani Matteo
Professor(s)
Reception:
send an email to danilo[dot]bruschi[at]unimi[dot]it
Room 8011, Via Celoria 18