Audit, Licensing and Accreditation of Information Security (курсова робота)

Major: Cybersecurity
Code of subject: 6.125.03.E.151
Credits: 2.00
Department: Information Security
Lecturer: Associate Professor, Ph.D. Garanyuk Petro
Semester: 6 семестр
Mode of study: денна
Learning outcomes: As a result of studying the academic discipline, the student must be able to demonstrate the following program learning outcomes: ZN 3.3. Ensure the introduction of accountability and access control systems to electronic information resources and processes in information and information and telecommunication (automated) systems using logs of event registration, their analysis and established protection procedures ZN 3.4. To carry out attestations (based on accounting and survey) of regime territories (zones), premises, etc., under the conditions of compliance with the secrecy regime, with recording of the results in the relevant documents. ZN 3.6. Implement the processes of detection, identification, analysis and response to information and/or cyber security incidents ZN 3.7. Apply national and international regulatory acts in the field of information security and/or cyber security to investigate incidents ЗН 3.8. To solve the problems of ensuring the continuity of the organization's business processes on the basis of risk theory and the established information security management system, in accordance with domestic and international requirements and standards ZN 3.10. Analyze and minimize the risks of information processing in information and telecommunication systems
Required prior and related subjects: Regulatory and legal support, standards and policy of information and cybernetic security Management of information securit
Summary of the subject: "Audit, Licensing and Accreditation of Information Security" acquaints students with the general principles of conducting audits in organizations, providing services in the field of technical and cryptographic protection of information, business activities in respect of which are subject to licensing. Assessment of information security. Basic concepts of information security management of the enterprise based on international standards of the ISO/IEC 27000 series. Considerable attention is paid to learning the principles and tasks of the information security system, studying the regulatory and legal framework for organizing and conducting information security audits, information risk assessment methods, implementing a set of measures , aimed at the development and implementation of information technologies that ensure information processing in information and telecommunication systems in accordance with the requirements established by regulatory and legal acts and normative documents in the field of information protection.
Assessment methods and criteria: Assessment of the level of achievement of learning outcomes is carried out during the semester control during the student's defense of coursework results. During the defense, the student presents the results of the completed course design. The oral component allows checking the level of students' knowledge of theory and identifying the skills of applying the acquired knowledge in solving practical tasks, as well as the skills of independent work with educational and scientific literature. Preparation for the defense of the results of the course work gives every student the opportunity to think through the whole course as a whole, to concentrate attention on key moments, to fix its main content in memory.
Recommended books: 1. Romaka V.A., Lagun A.E., Garasim Y.R., Rak T.S., Samotiy V.V., Rybiy M.M. Textbook "Information Security Audit" LSU BZD, 2015-362 p.; 2. Information security policy: textbook. / V. L. Buryachok, R. V. Hryshchuk, V. O. Khoroshko /. In general ed. Dr. technical Sciences, Prof. V.O. Good girl - K.: PVP "Zadruga", 2014. - 204 p. 3. Golovan S.M. Regulatory and legal provision of information security. / S.M. Golovan, O.S. Petrov, V.O. Khoroshko. – Luhansk: Ed. Nauka, 2012. – 480 p. 4. Andreev V.I. Basics of information security. /V.I. Andreev, V.O. Khoroshko, V.S. Cherednichenko, M.E. Shelest. Under the editorship of Prof. V.O. Horoshka - Type 2, supplement. and processing. - K.: DUIKT, 2009. - 292 p. 5. Kobozeva A.A. Analysis of the security of information systems. / A.A. Kobozeva, I.O. Machalin, V.O. Khoroshko Buryachok V.L. 6. Decision-making technology in complex sociotechnical systems: Monograph. / V.L. Buryachok, V.O. Good / Under general ed. Dr. technical Sciences, V.O. Khoroshko

Audit, Licensing and Accreditation of Information Security

Major: Cybersecurity
Code of subject: 6.125.03.E.148
Credits: 5.00
Department: Information Security
Lecturer: Associate Professor, Ph.D. Garanyuk Petro
Semester: 6 семестр
Mode of study: денна
Learning outcomes: As a result of studying the academic discipline, the student must be able to demonstrate the following program learning outcomes: ZN 3.3. Ensure the introduction of accountability and access control systems to electronic information resources and processes in information and information and telecommunication (automated) systems using logs of event registration, their analysis and established protection procedures ZN 3.4. To carry out attestations (based on accounting and survey) of regime territories (zones), premises, etc., under the conditions of compliance with the secrecy regime, with recording of the results in the relevant documents. ZN 3.6. Implement the processes of detection, identification, analysis and response to information and/or cyber security incidents ZN 3.7. Apply national and international regulatory acts in the field of information security and/or cyber security to investigate incidents ЗН 3.8. To solve the problems of ensuring the continuity of the organization's business processes on the basis of risk theory and the established information security management system, in accordance with domestic and international requirements and standards ZN 3.10. Analyze and minimize the risks of information processing in information and telecommunication systems
Required prior and related subjects: Regulatory and legal support, standards and policy of information and cybernetic security Management of information securit
Summary of the subject: "Audit, Licensing and Accreditation of Information Security" acquaints students with the general principles of conducting audits in organizations, providing services in the field of technical and cryptographic protection of information, business activities in respect of which are subject to licensing. Assessment of information security. Basic concepts of information security management of the enterprise based on international standards of the ISO/IEC 27000 series. Considerable attention is paid to learning the principles and tasks of the information security system, studying the regulatory and legal framework for organizing and conducting information security audits, information risk assessment methods, implementing a set of measures , aimed at the development and implementation of information technologies that ensure information processing in information and telecommunication systems in accordance with the requirements established by regulatory and legal acts and normative documents in the field of information protection.
Assessment methods and criteria: Current control, which consists of the implementation of practical work and the protection of reports. Examination control consisting of written and oral components.
Recommended books: 1. Romaka V.A., Lagun A.E., Garasim Y.R., Rak T.S., Samotiy V.V., Rybiy M.M. Textbook "Information Security Audit" LSU BZD, 2015-362 p.; 2. Information security policy: textbook. / V. L. Buryachok, R. V. Hryshchuk, V. O. Khoroshko /. In general ed. Dr. technical Sciences, Prof. V.O. Good girl - K.: PVP "Zadruga", 2014. - 204 p. 3. Golovan S.M. Regulatory and legal provision of information security. / S.M. Golovan, O.S. Petrov, V.O. Khoroshko. – Luhansk: Ed. Nauka, 2012. – 480 p. 4. Andreev V.I. Basics of information security. /V.I. Andreev, V.O. Khoroshko, V.S. Cherednichenko, M.E. Shelest. Under the editorship of Prof. V.O. Horoshka - Type 2, supplement. and processing. - K.: DUIKT, 2009. - 292 p. 5. Kobozeva A.A. Analysis of the security of information systems. / A.A. Kobozeva, I.O. Machalin, V.O. Khoroshko Buryachok V.L. 6. Decision-making technology in complex sociotechnical systems: Monograph. / V.L. Buryachok, V.O. Good / Under general ed. Dr. technical Sciences, V.O. Khoroshko