The Master's degree "Software system security" is aimed to develop professional figures that: a) are able to managing the whole life cycle of secure information systems; b) possess in-depth knowledge of legal implications in secure processing of digital information as well as about storage and transmission of sensitive data; c) are able to applying methods and techniques required in IT-related investigations, as well as evaluating the security degree of a given software system and proposing the usage of available technical innovations to the aim of constantly improving the level of information security in the application field of interest.
For more details see the course web page on the university portal.
The educational path of the master's degree course in "Software system security" is aimed to develop graduates having broad and deepened theoretical, methodological, experimental and applicative knowledge in the key areas of information security. More in detail, the graduate in "Software system security" will be able to address, at the proper abstraction level, IT-security problems by exploiting all the main tools provided by informatics-related disciplines (this goals are achieved through the informatics teachings). The graduate will acquire knowledge and skills about the available methods and technological tools required to manage the whole life-cycle of a secure information system, from design to implementation, testing and maintenance (these goals are achieved through the informatics teachings). Besides the methodological and technological knowledge concerning security, the graduate in "Software system security" will also develop specific knowledge about the legal aspects related to secure processing of classified digital data, as well as about storage and transmission of sensitive data (these goals are achieved through the legal teachings). Moreover, the graduate will be able to apply modern technologies and methods to the aim of conducting investigations about informatics-related violations and crimes, as well as evaluating the security level of a software system and eventually improving it by proposing the adoption of the most suited technological innovations available to constantly increase the security of information systems. In these scenarios, the graduate will not only be capable to adapt the solutions described in literature to a specific application field, but also to provide novel approaches eventually applicable to other contexts (these goals are achieved through the informatics and legal teachings). Finally, the graduate will develop the ability to work independently, with good executive, communication and managerial skills when coordinating or interacting with work teams featuring persons with different roles, expertise and culture in local or international contexts (these goals are achieved through the social sciences and economics teachings). Within most classes, the development of a project soliciting the student to explore and use the latest IT tools available to approach a given problem is a typical requirement. It is also expected and encouraged the participation of local enterprises to the aforementioned projects to give the student the chance of experiencing a real working environment. The educational path ends with the development of a Master's degree thesis. The thesis work can be carried out at the University or (upon an agreement) either in national or foreign enterprises and it will be presented and discussed during the final examination for the attainment of the Master's degree. The Master's degree thesis is a document (written in Italian or English) organized according to the typical guidelines of a scientific paper, realized by the student under the supervision of a mentor, concerning a novel scientific experience pertaining the topics of information security. The specific characterization of the educational path provides the knowledge and skills required to develop professional figures appealing for enterprises producing IT systems and networks as well as for any other kind of enterprises, administrations and organizations using or depending from secure information systems. The educational path also provides all the competencies required to access to further levels of education such as PhDs, masters, specializations, etc.
Area of Legal Informatics
Knowledge and comprehension
The knowledge and the skills that will be provided in this area have fundamental relevance for the formation of IT-security manager able not only to design secure software systems and to evaluating the security level of a complex software system, but also to exploit information technologies for processing and managing of sensitive data, according to the current regulations. More in detail, the educational path of the master's degree course in "Software system security" aims to provide the student with:
Applying knowledge and understanding
Thanks to the knowledge and skills developed, the student will be able to:
Area of Social sciences and economics
Knowledge and comprehension
The educational path of the master's degree course in "Software system security" is aimed at developing managers able to coordinate design, development, testing and maintenance of complex software systems, with particular regard to security. Knowledge and comprehension provided in this field will contribute to the student's managerial education indeed. More specifically, the educational path of the master's degree course in "Software system security" will provide:
Applying knowledge and understanding
Thanks to the knowledge and skills developed, the student will be able to:
Area of Informatics
Knowledge and comprehension
Knowledge and skills that will be provided in this area represent the core of the whole educational path. Graduates of the master's degree course in "Software system security" will be able to design, develop, evaluate and manage secure software systems. The educational path is therefore aimed to provide:
Applying knowledge and understanding
Thanks to the knowledge and skills developed, the student will be able to:
Making judgements
Skills to be achieved
Graduates of the master's degree course in "Software system security" will be able to working in complete autonomy to understand and manage the innovation requirements of enterprises and public administrations in the context of organization processes, also proposing secure ICT solutions. She/he will be therefore able to analyze, assess and suggest proper innovative solutions targeted to the continuous improvement of organization efficiency and effectiveness. By the end of the educational path, the graduate will be able to:
The graduate will be also aware of the social, ethical and juridical responsibilities related to her/his profession.
Teaching methods
The development of above mentioned skills will be achieved through different activities:
Verification methods
Verification of achievement of judgement autonomy is performed through the evaluation of written and oral examinations results as well as through the evaluation of project activity documentation produced in the course of both teachings and the final examination.
Communication skills
Skills to be achieved
Graduates of the master's degree course in "Software system security" will be able to synthesize and communicate the conclusions and the results of conducted analysis in a clear and effective way by using the language (English) most diffused in international reference working contexts, also taking advantage of the most up-to-date informatics tools. The graduate will also be able to purposefully exploit the mathematics, statistics and economics languages to the aim of analyzing, processing and presenting data. More in detail, the graduate will be able to:
Teaching methods
The development of above mentioned skills will be achieved through different activities:
Verification methods
Verification of achievement of communication skills is performed both through oral examinations required from most teachings and through the presentation of either individual or group made compositions. The final examination, discussed before a committee, represents a further occasion for testing aforementioned skills.
Lifelong learning skills
Skills to be achieved
Graduates of the master's degree course in "Software system security" will be able to study in autonomy, by effectively integrating the acquired knowledge. The graduate will therefore be able to keep his/her competencies updated in a field characterized by a continuous evolution, to learn challenges in new applicative fields, to successfully undertake highest level education courses (PhD or second-level master degree) and to undertake a managerial career requiring an advanced updating and autonomy degree. More in detail the graduate will be able to:
Teaching methods
The development of above mentioned skills will be achieved throughout the courses and particularly during the preparation of the final examination requiring a significant reworking and deepening of acquired knowledge.
Verification methods
Verification of achievement of learning skills is performed throughout a continuous assessment taking place during the formative activities as well as during the supervised development of projects and the final examination. This last exam will give the opportunity to verify the student's ability to autonomously deepen a topic.
Consultant for the design of secure software systems and risk management
Typical assignments
They operate in the vast field of IT consulting targeted to management of information systems and corporate management. Their competencies combine a deep knowledge about information technologies to good project management capability, knowledge about information security and related regulatory and legal topics, as well as knowledge about main technological trends in data privacy and risk analysis. They can propose solutions aimed at providing a global security strategy suited to the specific needs of a given information system. They also provide support in the implementation of these solutions and in defining organizational procedures to maximize the effectiveness of security approaches.
Skills related to role
They are IT pros specialized in methods and technologies for secure information systems with inter-disciplinary knowledge and management skills crucial to handle not only the more technical aspects but also other information systems management issues, market positioning, business and corporate strategies in the vast field of IT.
Employment opportunities
These professional figures are typically employed in the context of highly specialized consulting for enterprise and public administration, where they support both the executive and the information systems management, committed to manage projects or taking part to strategic planning requiring not only technical knowledge but also management, legal and inter-disciplinary skills. More in detail, the main employment opportunities are:
Designer of highly secure information systems
Typical assignments
Experts on advanced IT security issues related to both reliable software development and complex dynamics management in the context of software design. These professional figures typically deal with technical aspects involving an extremely deep understanding of technologies, enterprise processes concerning complex systems management and resource planning. They are required whenever there is a need for analyzing critical technological scenarios and for applying specific technologies for systems optimization.
Skills related to role
These professional figures are specialized in secure software development since they have deepened all the salient aspects of relevant innovations. Their skills cover all the main fields of information security including secure programming by using advanced methods of static and dynamic analysis of source code, malicious software analysis, service oriented architectures design, advanced cryptography, advanced protection techniques (biometry).
Employment opportunities
The sound background in the programming of reliable systems and complex enterprise management represent a valuable asset for roles in public and private working context where critical software systems and secure systems have to be designed, implemented and tested. More in detail, highly specialized positions could be performed in:
Project manager for information systems
Typical assignments
Specialists in web services and information systems design featuring advanced requirements of security and secure data management in public and enterprise contexts. Typical responsibilities of these experts include project articulation in work-packages, tasks and milestones, task and technical personnel supervision, budget management, tools and resources selection, suppliers and consultant management and deadlines management.
Skills related to role
These professional figures possess technical, managerial and inter-disciplinary skills necessary to steer and organize complex activities in terms of both technical and managerial challenges. Thanks to a technical-scientific knowledge, these figures have cross-competencies including project management capabilities, economics, legal and risk management understanding in the context of critical software systems.
Employment opportunities
The role of project manager is mainly required in enterprises providing information services or as project advisor for customer enterprise, where there is a need for coordinating the software development team by optimally planning all the project steps, also providing feedback on the technologies required to realize software applications featuring high levels of reliability and security.
Contrada Fonte Lappone - 86090 - Pesche (IS)