Regulatory Legal Support and International Standards of Cybersecurity

Major: Cybersecurity
Code of subject: 6.125.00.O.034
Credits: 4.00
Department: Information Security
Lecturer: Professor Opirskyy I.R.
Semester: 4 семестр
Mode of study: денна
Learning outcomes: As a result of studying the academic discipline, the student should be able to demonstrate the following learning outcomes: 1. use the current legislative and regulatory framework when organizing the protection of information with limited access; 2. to regulate mutual relations between subjects of information security, to determine their rights, duties and responsibilities. 3. normatively ensure the actions of information security subjects at all levels, namely - the person, the society, the state. 4. establish the order of application of various forces and means of ensuring information security. 5. in accordance with the future specialty, evaluate the effectiveness of these measures and determine the necessary actions for their improvement; 6. to know a set of standards, orders, provisions that provide organizational, legal, engineering and operational measures aimed at preventing the disclosure and leakage of information with limited access; 7. understand information and cyber security policies;
Required prior and related subjects: Organizational support of information cyber security Ensuring information security of the state
Summary of the subject: The training course reflects modern views on the state of regulatory and legal acts of Ukraine, standards in the field of information and cyber security. Within the scope of the discipline, we will consider the normative framework for ensuring the national security of Ukraine in the information sphere, taking into account the existing hierarchy of normative acts. At the highest level, we will consider the norms of the Constitution of Ukraine, which establish the conceptual provisions of the national security of Ukraine in all spheres of its existence, the law of Ukraine "On the National Security of Ukraine", "On the National Security Strategy of Ukraine", "On the Military Security Strategy of Ukraine", "The Doctrine of Information security of Ukraine". These documents take into account the main provisions of international treaties and agreements ratified by Ukraine, which concern its national security. At the second level, we will consider the laws of the constitutive direction, which define important provisions on ensuring national security in the information sphere ("Concept of the development of the security and defense sector of Ukraine", "On the main principles of ensuring cyber security of Ukraine", "Strategy for the development of the information society in Ukraine", "On information ", "On access to public information", "On personal data protection", "On state secrets", "On information protection in information and telecommunication systems", "On radio frequency resource", "On electronic communications", "General requirements for of cyber protection of critical infrastructure objects", "Procedure for organizing and conducting an independent audit of information security at critical infrastructure objects of the state", "On the Cybersecurity Strategy of Ukraine"). At the third level - the laws of Ukraine at the institutional level, where the main forms of activity of state bodies in the process of ensuring national security in the information and other spheres of life of the individual, society and the state are fixed (in particular, "On the Defense of Ukraine", "On the Armed Forces of Ukraine", "On the Service of the Security of Ukraine", "On the State Service for Special Communication and Information Protection", "On the Police", "On the Prosecutor's Office", "On the State of Emergency", etc.).
Assessment methods and criteria: Current control of classroom classes is conducted for the purpose of clarification • the circumstances of the educational process, determining its results in the following forms: • preliminary detection of students' knowledge level before classes begin; • current check in the process of assimilation of each topic being studied; • evaluation of the student's activity in the course of lectures; • assessment of the student's activity in the process of practical classes; • verification of performance of practical works; • checking the performance of control work; • an oral survey of the assimilation of knowledge acquired in the process of performing laboratory work; The final control is carried out in order to evaluate the results of studies at the educational and qualification level of a bachelor. The final control of the discipline "Legal support and international standards of cyber security" includes a semester control in the form of an exam (oral and written component). Oral and written component in practical classes - 40 points Exam -60
Recommended books: 1. Law of Ukraine "On National Security of Ukraine"; 2. Constitution of Ukraine; 3. Law of Ukraine "On the National Security Strategy of Ukraine"; 4. Law of Ukraine "On the New Edition of the Military Doctrine of Ukraine"; 5. Law of Ukraine "On the New Edition of the Military Doctrine of Ukraine"; 6. Concept of the development of the security and defense sector of Ukraine"; 7. Law of Ukraine "On Information"; 8. Law of Ukraine "On Access to Public Information" 9. Law of Ukraine "On Protection of Personal Data" 10. Law of Ukraine "On State Secrets" 11. Law of Ukraine "On Information Protection in Information and Telecommunication Systems" 12. Law of Ukraine "on radio frequency resource", "on telecommunications", "on protection of public morals" 13. The procedure for organizing and conducting an independent audit of information security at critical state infrastructure facilities" 14. Khoroshko V.O., Cherednychenko B.C., Shelest M.E. X 80 Basics of information security / Ed. Prof. V.O. Good girl - K.: DUIKT, 2008. - 186 p. 15. Gerasimenko V.A., Melyuk A.Ya. Basics of information protection. – M.; MYTHS, 1997, 537 p. Golego A.G., Khoroshko V.A. Organizational and technical support of information protection. – K.; KMUGA, 1999, - 120 p. 16. Samokhvalov Yu.Ya., Temnikov V.O., Khoroshko V.O. Organizational and technical support of information protection. Study guide / Ed. Prof. V.O. Horoshka - K.; NAU, 2002, 207 p. 17. Khoroshko V.A., Khoroshko A.V., Pirtschalava P.G. Methods and means of information protection: Methodological instructions.– K.; KMUGA, 1997, - 38 p. 18. ISO 27000 series of standards

Regulatory Legal Support and International Standards of Cybersecurity

Major: Cybersecurity
Code of subject: 6.125.00.O.033
Credits: 4.00
Department: Information Technology Security
Lecturer: professor Mychuda Lesya Zynoviyivna
Semester: 4 семестр
Mode of study: денна
Learning outcomes: LC 2. Knowledge and understanding of the subject area and understanding of the profession. LC 5. Ability to search, process and analyze information. FC 1. Ability to apply the legal and regulatory framework, as well as national and international requirements, practices and standards in order to carry out professional activities in the field of information and cybersecurity. FC 2. Ability to use information and communication technologies, modern methods and models of information security and / or cybersecurity. ZN 3. Use the results of independent search, analysis and synthesis of information from various sources to effectively solve specialized problems of professional activity. ZN 4. Analyze, argue, make decisions in solving complex specialized problems and practical problems in professional activities, which are characterized by complexity and incomplete definition of conditions, be responsible for the decisions made.
Required prior and related subjects: co-requisites: • Fundamentals of Information and Cyber Security.
Summary of the subject: Legal acts that enshrine the conceptual provisions of information security of Ukraine. Regulations that set out the definitive provisions for ensuring information security of Ukraine. Legal acts defining the procedure of protection of state secrets in Ukraine. Legal acts on information security of telecommunication systems. Laws of Ukraine on electronic document circulation and electronic digital signature. By-laws on electronic document circulation and electronic digital signature. Legal acts defining the order of technical protection of information in Ukraine. Legal acts in the sphere of protection of state electronic information resources of Ukraine. International cybersecurity standards. ISO \ IEC 27000 Series. ISO \ IEC 13335 Information Technology Security Management. ISO \ IEC 15408 Criteria for assessing information technology security. ISO \ IEC Object Authentication Using Symmetric Algorithms. PCI DSS Electronic payment security.
Assessment methods and criteria: • oral examination in practical classes, preparation and defense of abstracts (30%) • final control - exam (written-oral form) (written component - test 50%, oral component of the exam 20% = in the amount of 70%).
Recommended books: 1. The Constitution of Ukraine 2. On the foundations of national security of Ukraine (law) 3. National Security Strategy of Ukraine (UE № 105/2007) 4. Concept (basics of state policy) of national security of Ukraine (JHA № 3/97) 5. Doctrine of information security of Ukraine (UE № 514/2009) 6. Law of Ukraine on Information 7. Law of Ukraine on State Secrets 8. Law of Ukraine on information protection in information and telecommunication systems 9. ISO \ IEC 27000. ISO \ IEC 13335. ISO \ IEC 15408. PCI DSS. Orange book.