Architecture and Traffic Optimization of Secured Networks
Major: Cyber Security
Code of subject: 8.125.00.M.018
Department: Information Security
Lecturer: Professor Parkhuts Liubomyr
Semester: 2 семестр
Mode of study: денна
Завдання: As a result of studying the academic discipline, the student should be able to demonstrate the following learning outcomes: to know: – based on types of architecture of protected information networks; – methods of traffic optimization in protected information networks; – basic technical means used to protect information in protected information networks; – methods and means of information protection in protected information networks; – basic technical means used to protect information from unauthorized interception; - the procedure for creating and designing protected information networks. The study of an academic discipline involves the formation and development of students' competencies: general: - the ability to solve the tasks and make appropriate informed decisions; - the ability to conduct research at an appropriate level, to have research skills that are manifested in the ability to form (by making presentations or presenting reports) new products in the chosen field, to choose appropriate directions and appropriate methods for their implementation; – knowledge and understanding of the subject area and understanding of the profession; - skills in using information and communication technologies, implementing computer programs and using existing ones; - the ability to evaluate and maintain the quality of the work performed; – creativity, ability to system thinking; – potential for further education; professional: - the ability to plan and implement appropriate measures to protect information in information and communication systems; – the ability to use skills to detect and block channels and methods of unauthorized access to information, sources and methods of destabilizing influence on information; - the ability to design information protection and security systems and their elements, taking into account all aspects of the task, including creation, debugging, operation, maintenance and disposal; – the ability to substantiate and implement a system of protection of information resources with limited access at objects of information activity; - the ability to carry out attestation (based on accounting and survey) of regime territories (zones), premises, etc., under the conditions of compliance with the secrecy regime, with the recording of the results in the relevant documents. - the ability to evaluate the compliance of the information protection system of the automated system with its purpose in accordance with the requirements of current standards.
Learning outcomes: As a result of studying the discipline, the student must be able to demonstrate the following learning outcomes: to know: - based on the source and the path of information leakage; - ways of unauthorized interception of information; - the main technical means used for the unauthorized interception of information; - methods and means of protection of information; - the main technical means used to protect information from unauthorized interception; - the order of designing the information security system.
Required prior and related subjects: Fundamentals of information and cybersecurity; Computer networks; Methods and means of protection of information; Information security audit; Protection of information in computer networks;
Summary of the subject: The discipline "Optimization of Architecture and Traffic of Secured Networks" in the system of training specialists of III educational qualification Ph.D. is a general technical course. The subject of the course is: studying modern methods of designing information security systems; set of basic theoretical provisions of creation of information security systems; processes for ensuring the necessary level of information security; peculiarities of design technologies and security of information on objects.
Опис: The discipline "Optimization of Architecture and Traffic of Secured Networks" in the system of training specialists of III educational qualification Ph.D. is a general technical course. The subject of the course is: studying modern methods of designing information security systems; set of basic theoretical provisions of creation of information security systems; processes for ensuring the necessary level of information security; peculiarities of design technologies and security of information on objects.
Assessment methods and criteria: Current control (CC) -30; Examination examination - 70.
Критерії оцінювання результатів навчання: Diagnostics of knowledge is carried out by conducting test control works in lecture classes, as well as during the defense of laboratory works. Current control of classroom classes is carried out with the aim of clarifying the circumstances of the educational process, determining its results in the following forms: • preliminary detection of students' knowledge level before classes begin; • current check in the process of assimilation of each topic being studied; • evaluation of the student's activity in the course of lectures; • checking the performance of laboratory work; • checking the performance of control work; • an oral examination of the assimilation of knowledge acquired in the process of performing laboratory work. Final (examination) control is carried out based on the results of test control and oral survey.
Recommended books: Dudykevych V.B., Ivanchenko E.V., Kostyak M.Y., Pavlov I.M., Parkhuts L.T., Khoroshko V.O. Designing of complex information security systems. Tutorial. - Lviv: Publisher of Lviv Polytechnic National University, - 2016. - P.94. Parkhut L.T. Protecting the corporate system of the enterprise: the main stages and ways of implementation / L.T. Parchuk, A.Z. Piskozub // Vis. Lviv Polytechnic, Automation, Measurement and Control. - 2002. - № 445, - P.149-155. Kudinov V.A. Optimization of the information network structure / V.A .Kudinov, L.T. Parkhut, V.A. Khoroshko // Protection of information. - 2004. - № 3, - P.44-48. Kudinov V.A. Estimation of efficiency of algorithms of switching of packets of messages in the secure information network / V.A. Kudinov, L.T. Parkhut, D.V. Plus, V.A. Khoroshko // Protection of information. Spec. output. - 2004. - P.35-39. Parchut L.T. The solution of the Weber problem for the optimal placement of computers in the information network / L.T.Parchuk, V.O. Khoroshko // Coll. of sciences. proceedings of NSU, Dnipropetrovsk, 2004. № 19, Vol. 2. - P.157-160. Kudinov V.A. Methods of system designing of corporate networks / V.A. Kudinov, L.T. Parkhut, V.A. Khoroshko // Bulletin of DUIKT. - 2005. - Vol.3, - № 3-4, - P.184-187. Dudykevych V.B.Analysis of security problems and ways of increasing the efficiency of cryptographic security in cellular information transmission systems / V.B. Dudykevich, I.B. Lomnitsky, L.T. Parkhuts // Collected Science of the Sevastopol Naval Institute named after P.S. .Nahimova. Sevastopol, 2005. - Vyp. 2 (8). - P.70-77. Parckut L.T. Search for the dispersion median of a graph / LTParchuk // Selection and processing of information. - 2005. - Vip. 23 (99). - P.143-147.