Databases and Knowledge Bases (курсова робота)

Major: Cybersecurity
Code of subject: 6.125.00.O.034
Credits: 2.00
Department: Information Technology Security
Lecturer: assistant professor Voytusik Stepan
Semester: 4 семестр
Mode of study: денна
Learning outcomes: ZN 2. To organize own professional activity, to choose optimum methods and ways of the decision of difficult specialized problems and practical problems in professional activity, to estimate their efficiency. ZN 3. Use the results of independent search, analysis and synthesis of information from various sources to effectively solve specialized problems of professional activity. ZN 15. Possession of methods of general scientific analysis in the field of information technology and information security; ZN 18. Ability to demonstrate knowledge of the current state of affairs and the latest technologies in the field of information technology and information security; ZN 19. Knowledge of mathematical models of tasks of information security and information protection. ZN 25. Knowledge of mathematical methods of optimization in order to obtain the best performance of tools and systems. ZN 1.4. Apply theories and methods of protection to ensure the security of information in information and telecommunications systems. ZN 1.8. Ensure proper functioning of monitoring systems for information resources and processes in information [1] telecommunication systems ZN 2.5. Implement measures to combat unauthorized access to information resources and processes in information and information and telecommunications (automated) systems. 3 3.10. Analyze and minimize the risks of information processing in information and telecommunications systems. ZN 4.5. Assess the possibility of realization of potential threats to information processed in information and telecommunication systems and the effectiveness of the use of comprehensive means of protection in the implementation of threats of different classes.
Required prior and related subjects: Programming technologies. Software security. Higher mathematics. IS incident investigation technologies.
Summary of the subject: Database systems. Basic concepts. Database architecture. Data models. Relational data model. Relationship keys. Fundamentals of relational algebra. Relational operators and relations operations. Relational algebra. Coverage of functional dependencies. Normalization of relational circuits. Normal Boyce-Codd form, multi-valued functional dependencies. Inference axioms for multivalued dependences, Fourth normal form. Introduction to intelligent knowledge representation systems and inferences Review of research in the field of artificial intelligence part 1 Review of research in the field of artificial intelligence Part 2
Assessment methods and criteria: Current control in the classroom is carried out in order to clarify the circumstances of the educational process, to determine its results in the following forms: • preliminary identification of students' level of knowledge before classes; • current verification in the process of mastering each topic studied; • assessment of student activity in the process of lectures and practical classes; • checking the performance of laboratory and practical work; • checking the performance of control work; • checking the performance of course work; • oral examination of the acquisition of knowledge acquired in the course of the course work. Final (examination) control is carried out based on the results of written control and oral examination.
Recommended books: 1. Пасічник В. В., Резніченко В. А. Організація баз даних та знань. — К.: Видавнича група ВНУ, 2006. — 384 с.: іл. ІБВК 966-552-156-Х . 2. Гайдаржи Володимир Іванович , Дацюк Оксана Антонівна. Основи проектування та використання баз даних : Навч. посібник. - 2- ге вид., випр. і доп. - К.: Політехніка, 2004. - 256 с. ISBN 966-622-167-5. УДК 004.65(075.8) 3. Новоженов Ю.В. Объектно-ориентированные технологии разработки сложных програмных систем. – М.: Издание A.S., 1996. 4. Атре Ш. Структурный поход к организации баз данных. – М.: финансы и статистика, 1983. – 320 с. 5. Джеймс Р. Грофф, Пол Н. Вайнберг. SQL: полное руководство: пер. с англ. – К.: BHV, 1999. – 608 с.

Databases and Knowledge Bases (курсова робота)

Major: Cybersecurity
Code of subject: 6.125.00.O.035
Credits: 2.00
Department: Information Security
Lecturer: Ph.D., Associate Professor Harasymchuk O.I.
Semester: 4 семестр
Mode of study: денна
Learning outcomes: - To organize own professional activity, to choose optimum methods and ways of the decision of difficult specialized problems and practical problems in professional activity, to estimate their efficiency. - Use the results of independent search, analysis and synthesis of information from various sources to effectively solve specialized problems of professional activity. - Possession of methods of general scientific analysis in the field of information technology and information security. - Ability to demonstrate knowledge of the current state of affairs and the latest technologies in the field of information technology and information security. - Knowledge of mathematical models of information security and information security. - Knowledge of mathematical methods of optimization in order to obtain the best performance of tools and systems. - Implement measures to combat unauthorized access to information resources and processes in information and information and telecommunications (automated) systems. - Analyze and minimize the risks of information processing in information and telecommunications systems. - Assess the feasibility of potential threats to information processed in information and telecommunications systems and the effectiveness of integrated protection in the implementation of threats of different classes.
Required prior and related subjects: - Programming technologies. - Information Technology. - Information security incident investigation technology.
Summary of the subject: Design a relational database, perform sampling according to the task, perform basic operations of data manipulation, event logging and organize data protection.
Assessment methods and criteria: - check the performance of course work (50%); - oral examination of the acquisition of knowledge acquired during the course work (50%).
Recommended books: 1. Berko A.Yu. Database and knowledge systems. Book 1. Organization of databases and knowledge: a textbook. - 2nd type. / А.Ю. Berko, O.M. Veres, VV Beekeeper. - Publisher: "Magnolia-2006", 2015. - 440 p. 2. Berko A.Yu. Database and knowledge systems. Book 2. Database and knowledge management systems: a textbook. / А.Ю. Berko, O.M. Veres, VV Beekeeper. - Publisher: "Magnolia-2006", 2013. - 680 p. 3. Gaidarzhi Volodymyr Ivanovych, Patsyuk Oksana Antonivna. Fundamentals of design and use of databases: Textbook. manual. - 2nd ed., Ed. and ext. - K .: Polytechnic, 2004. - 256 p. ISBN 966-622-167-5. UDC 004.65 (075.8). 4. Gaidarzhi VI, Izvarin IV Databases in information systems. - Kyiv: University "Ukraine", 2018. - 417 p. 5. Groff J. R. SQL. Full guide / J. R. Groff, P.N. Weinberg, E. J. Oppel. - St. Petersburg: Williams, 2015. - 959 p. 6. Pasichnyk VV, Reznichenko VA Organization of databases and knowledge. - Kyiv: University Publishing Group, 2006. - 384 pp .: ill. IBVK 966-552-156-X.

Databases and Knowledge Bases

Major: Cybersecurity
Code of subject: 6.125.00.O.030
Credits: 6.00
Department: Information Security
Lecturer: Ph.D., Associate Professor Harasymchuk O.I.
Semester: 4 семестр
Mode of study: денна
Learning outcomes: - To organize own professional activity, to choose optimum methods and ways of the decision of difficult specialized problems and practical problems in professional activity, to estimate their efficiency. - Use the results of independent search, analysis and synthesis of information from various sources to effectively solve specialized problems of professional activity. - Possession of methods of general scientific analysis in the field of information technology and information security. - Ability to demonstrate knowledge of the current state of affairs and the latest technologies in the field of information technology and information security. - Knowledge of mathematical models of information security and information security. - Knowledge of mathematical methods of optimization in order to obtain the best performance of tools and systems. - Implement measures to combat unauthorized access to information resources and processes in information and information and telecommunications (automated) systems. - Analyze and minimize the risks of information processing in information and telecommunications systems. - Assess the feasibility of potential threats to information processed in information and telecommunications systems and the effectiveness of integrated protection in the implementation of threats of different classes.
Required prior and related subjects: - Programming technologies. - Information Technology. - Information security incident investigation technology.
Summary of the subject: Database systems. Basic concepts. Database architecture. Data models. Relational data model. Relationship keys. Fundamentals of relational algebra. Relational operators and relations operations. Relational algebra. Coverage of functional dependencies. Normalization of relational circuits. Normal Boyce-Codd form, multi-valued functional dependencies. Inference axioms for multivalued dependences, Fourth normal form. SQL language and an overview of its capabilities. Introduction to intelligent knowledge representation systems and knowledge output. Theoretical aspects of knowledge engineering. Review of research in the field of artificial intelligence.
Assessment methods and criteria: • written reports on laboratory work, oral questioning, examination (25%) • final control (75 %, control event, exam): written-oral form (75%)
Recommended books: 1. Berko A.Yu. Database and knowledge systems. Book 1. Organization of databases and knowledge: a textbook. - 2nd type. / А.Ю. Berko, O.M. Veres, VV Beekeeper. - Publisher: "Magnolia-2006", 2015. - 440 p. 2. Berko A.Yu. Database and knowledge systems. Book 2. Database and knowledge management systems: a textbook. / А.Ю. Berko, O.M. Veres, VV Beekeeper. - Publisher: "Magnolia-2006", 2013. - 680 p. 3. Gaidarzhi Volodymyr Ivanovych, Patsyuk Oksana Antonivna. Fundamentals of design and use of databases: Textbook. manual. - 2nd ed., Ed. and ext. - K .: Polytechnic, 2004. - 256 p. ISBN 966-622-167-5. UDC 004.65 (075.8). 4. Gaidarzhi VI, Izvarin IV Databases in information systems. - Kyiv: University "Ukraine", 2018. - 417 p. 5. Groff J. R. SQL. Full guide / J. R. Groff, P.N. Weinberg, E. J. Oppel. - St. Petersburg: Williams, 2015. - 959 p. 6. Pasichnyk VV, Reznichenko VA Organization of databases and knowledge. - Kyiv: University Publishing Group, 2006. - 384 pp .: ill. IBVK 966-552-156-X.

Databases and Knowledge Bases

Major: Cybersecurity
Code of subject: 6.125.00.O.029
Credits: 6.00
Department: Information Technology Security
Lecturer: assistant professor Voytusik Stepan
Semester: 4 семестр
Mode of study: денна
Learning outcomes: ZN 2. To organize own professional activity, to choose optimum methods and ways of the decision of difficult specialized problems and practical problems in professional activity, to estimate their efficiency. ZN 3. Use the results of independent search, analysis and synthesis of information from various sources to effectively solve specialized problems of professional activity. ZN 15. Possession of methods of general scientific analysis in the field of information technology and information security; ZN 18. Ability to demonstrate knowledge of the current state of affairs and the latest technologies in the field of information technology and information security; ZN 19. Knowledge of mathematical models of tasks of information security and information protection. ZN 25. Knowledge of mathematical methods of optimization in order to obtain the best performance of tools and systems. ZN 1.4. Apply theories and methods of protection to ensure the security of information in information and telecommunications systems. ZN 1.8. Ensure proper functioning of monitoring systems for information resources and processes in information [1] telecommunication systems ZN 2.5. Implement measures to combat unauthorized access to information resources and processes in information and information and telecommunications (automated) systems. 3 3.10. Analyze and minimize the risks of information processing in information and telecommunications systems. ZN 4.5. Assess the possibility of realization of potential threats to information processed in information and telecommunication systems and the effectiveness of the use of comprehensive means of protection in the implementation of threats of different classes.
Required prior and related subjects: Programming technologies. Software security. Higher mathematics. IS incident investigation technologies.
Summary of the subject: Database systems. Basic concepts. Database architecture. Data models. Relational data model. Relationship keys. Fundamentals of relational algebra. Relational operators and relations operations. Relational algebra. Coverage of functional dependencies. Normalization of relational circuits. Normal Boyce-Codd form, multi-valued functional dependencies. Inference axioms for multivalued dependences, Fourth normal form. Introduction to intelligent knowledge representation systems and inferences Review of research in the field of artificial intelligence part 1 Review of research in the field of artificial intelligence Part 2
Assessment methods and criteria: Current control in the classroom is carried out in order to clarify the circumstances of the educational process, to determine its results in the following forms: • preliminary identification of students' level of knowledge before classes; • current verification in the process of mastering each topic studied; • assessment of student activity in the process of lectures and practical classes; • checking the performance of laboratory and practical work; • checking the performance of control work; • checking the performance of course work; • oral examination of the acquisition of knowledge acquired in the course of the course work. Final (examination) control is carried out based on the results of written control and oral examination.
Recommended books: 1. Пасічник В. В., Резніченко В. А. Організація баз даних та знань. — К.: Видавнича група ВНУ, 2006. — 384 с.: іл. ІБВК 966-552-156-Х . 2. Гайдаржи Володимир Іванович , Дацюк Оксана Антонівна. Основи проектування та використання баз даних : Навч. посібник. - 2- ге вид., випр. і доп. - К.: Політехніка, 2004. - 256 с. ISBN 966-622-167-5. УДК 004.65(075.8) 3. Новоженов Ю.В. Объектно-ориентированные технологии разработки сложных програмных систем. – М.: Издание A.S., 1996. 4. Атре Ш. Структурный поход к организации баз данных. – М.: финансы и статистика, 1983. – 320 с. 5. Джеймс Р. Грофф, Пол Н. Вайнберг. SQL: полное руководство: пер. с англ. – К.: BHV, 1999. – 608 с.