Home/ Majors directory/Computer Science (Design and programming of intelligent systems and devices)/Information Theory and Cyber Security
Information Theory and Cyber Security
Major: Computer Science (Design and programming of intelligent systems and devices)
Code of subject: 6.122.12.O.031
Credits: 4.00
Department: Computer-Aided Design
Lecturer: PhD. Ivantsiv Roman D. labs - PhD. Roman D. Ivantsiv.
Semester: 5 семестр
Mode of study: денна
Learning outcomes: The main provisions of information theory. Classification of types of information and information technologies. Classification of signal types. Classification of communication channels. Generalized structural scheme of information transmission system, its components and components, their main parameters. Information and information processes. Nyquist's calculus. Signal capacity, communication channel capacity. Quantitative characteristics of information. Entropy and their properties. Conditional and unconditional entropy.Knowledge of the theoretical foundations of information theory, the ability to compile a generalized structural diagram of the information transmission system, analyze its components and components, their basic parameters, compile and analyze mathematical models of information signals and models of information transmission channels. Determine the redundancy of information, productivity of the information source, know the classification of signals, know the basic parameters and forms of determination of deterministic signals, principles of conversion of continuous signals into discrete, methods of recovery of discrete signals, methods of signal quantization, determine information parameters of discrete and continuous message sources. Determine the signal capacity and communication channel capacity, know the conditions of information transmission with minimal losses, determine the quantitative assessment of the efficiency of information transmission systems. The main provisions of the theory of information security. Legislation in the field of information protection. Methodology of information protection in computer systems and networks. History of cryptography, know the ciphers used in the past and know modern computer ciphers. Mathematical foundations of modern information security theory. The main directions of development of modern cryptography. Block ciphers based on Feistel network, RSA cipher. Electronic digital signatures. Technological construction of a comprehensive information security system. Effectively organize information security in computer systems and networks, have modern information security technologies, have sufficient skills to design and develop new tools and methods of information security, study and use new promising methods of information security.
Required prior and related subjects: Prerequisites: Algorithmization and Programming, part 1 and part 2. Computer Science. Object-Oriented Programming.
Co-requisites: Methods and tools for computer information technology. Software creation technologies. Theory of algorithms.
Summary of the subject: Basic provisions of information theory. Classification of types of information and information technologies. Classification of types of signals. Classification of communication channels. Generalized block diagram of the information transmission system, its components and components, their main parameters. Quantitative assessment of information. Information parameters of discrete and continuous message sources. Mathematical models of information signals and models of channels of information transmission. Methods for quantifying the effectiveness of information transfer systems. To determine the signal capacity and the capacity of the communication channel, to determine the conditional and unconditional entropy of messages, the redundancy of information, to determine the conditions of information transmission with minimal losses, to determine the quantitative evaluation of the efficiency of information transmission systems.
Legislation in the field of information security. The main tasks of the information security system, the methodological basis for the construction of the information security system. The main threats and basic methods of information protection, statistical characteristics of encrypted and open texts, the history of cryptography and the mathematical foundations of modern theory of information security, software and hardware protection methods. Use of passwords and access control mechanisms. Identification and authentication, identification and authentication requirements, classification of authentication and authentication tools. Security issues and firewalls. Electronic digital signatures. Features of the implementation of a comprehensive information security system.
Assessment methods and criteria: Assessment of students 'knowledge is conducted in the form of semester control, which is conducted at the end of the semester and includes the results of current control of students' knowledge, which is assessed by laboratory work, oral examination and control event - the answer to the ticket. The control event is a mandatory type of control and is conducted in writing and orally at the end of the semester.
Current control (45%): Results of protection of laboratory works, performance of complex work, oral interrogation.
Final control (55%, exam): testing, survey.
Recommended books: Жураковський Ю.П., Полторак В.П. Теорія інформації та кодування. Підручник.- К.:Вища школа, 2001.- 255 с. Шульгин В.И. Основы теории передачи информации, Харьков, 2002. – 160 с. Основи інформаційних технологій і систем: навч. посібник / В.А. Павлиш, Л.К. Гліненко. – Львів : Видавництво Львівської політехніки, 2013. – 500 с. Теорія інформації. Конспект лекцій для студентів спеціальності 122 Компютерні_науки та інформаційні технології / Укл. Іванців Р.Д. - електронний документ - id = 10861 - 2018. Бобало Ю.Я., І.В.Горбатий. і др. Інфрмаційна безпека : навч. посібник / За.ред. Бобала Ю.Я., І.В.Горбатого. – Львів: Видавництво Львівської політехніки, 2019. – 580 с.Яковина В.С., Федасюк Д.В. Основи безпеки комп’ютерних мереж: Навчальний посібник / За ред. Д.В. Федасюка. – Львів: НВФ «Україські технології», 2008. – 396 с. Новиков О.М. , Гайворонський М.В. Захист інформації в комп’ютерних системах і мережах. – К.: «Издательская группа bhv», 2006. – 496 с. В.Ємець, А.Мельник. Сучасна криптографія. Основні поняття. – Львів: 2007. Технології захисту інформації. Конспект лекцій для студентів спеціальності 122 Компютерні_науки та інформаційні технології / Укл. Іванців Р.Д. - електронний документ - id = 5508 -2018.