Design of Critical Infrastructure Objects Security Systems and State Secrets (курсова робота)

Major: Cybersecurity
Code of subject: 6.125.02.E.137
Credits: 2.00
Department: Information Security
Lecturer: Professor Opirskyy Ivan
Semester: 7 семестр
Mode of study: денна
Learning outcomes: ability to demonstrate knowledge of the basics of professionally-oriented disciplines of the specialty in the field of information security, information security, information security management, security of information and communication systems and administrative management of security and cybersecurity. • the ability to use the skills of experimental calculations of characteristics and the choice of elements of a particular automated system, taking into account the required level of information protection in the organization (enterprise); • ability to demonstrate knowledge and understanding of design methodologies, relevant regulations, applicable standards and specifications; • ability to demonstrate knowledge of the current state of affairs and the latest technologies in the field of information technology and information security; • apply knowledge and understanding to identify, formulate and solve technical problems of the specialty, using known methods; • systematically think and apply creative abilities to the formation of fundamentally new ideas; • apply knowledge of technical characteristics, design features, purpose and rules of operation of equipment and facilities to solve technical problems of the specialty; • work effectively both individually and as a team; • combine theory and practice, as well as make decisions and develop a strategy for solving problems of the specialty (specialization), taking into account universal values, social, state and industrial interests; • ability to adapt to new situations and make decisions;
Required prior and related subjects: Ensuring information security of the state Organizational support of technical protection of information Regulatory and legal support of information and cyber security standards and policies Fundamentals of information and cyber security
Summary of the subject: Іntroductory lecture. The purpose and objectives of the course. Protection of state secrets and its main directions Restricted information: concepts and types Division and general characteristics of information by access mode Legislative support for the protection of state secrets. Legislative requirements for information containing features of state secrets, introduced to protect state secrets Organizational and legal measures for the protection and defense of state secrets. Organizational and legal structure of the system of protection of state secrets. Pre-expert stage of classifying information as a state secret. Stage of expert consideration of information to decide on its classification as a state secret. Stage of formalization of the decision. The basic principles of assigning information containing signs of state secrets to various degrees of secrecy. The concept of "admission" and "access" to information with limited access. Forms of admission to state secrets. Organization of access to information constituting a state secret. The procedure for obtaining a special permit for activities related to state secrets. Permission system for access to trade secrets. Mandatory conditions related to ensuring the safety of use, preservation and protection of state secrets. Technical protection of information containing a state secret. Structure and powers of regime-secret bodies. Internal - object mode and its tasks. Subdivisions of the enterprise that solve the problem of organizing the intra-object regime. Organizational means of information protection General grounds for the application of legal liability for the disclosure of state secrets. Criminal liability for disclosure of a state secret. Loss of documents containing a state secret. Administrative liability for violation of the state secret regime. Responsibility for disclosure of state secrets in the legislation of foreign countries. Basic systems for protection of critical infrastructure. Species and subspecies Perimeter security systems for information with limited access Early emergency detection systems for critical infrastructure Access control and management systems at facilities where there is a state secret Other types of information protection systems and objects where there is a state secret (cryptographic protection systems, lightning protection systems, premises protection systems)
Assessment methods and criteria: Laboratory classes, credit (with an oral component) -100 points
Recommended books: 1. Laboratory works on the course "Systems of protection of state secrets". 2. Textbook. Ensuring the information security of the state [Text]: textbook. way. / VS Zachepylo, IR Opirsky and others; Nat. Lviv Polytechnic University. - Lviv: Lviv Publishing House. Polytechnic, 2017 3. Protection of state secrets: textbook. manual / VS Зачепило, З.А. Shandra, I.R. Opirsky, I.Ya. Tishik, L.V. Frost. - Lviv: Lviv Polytechnic Publishing House, 2015. - 168 p. (IBSN 978-617-607-850-0). 1. Laws of Ukraine: "On information", "On state secrets", "On protection of information in automated systems", "On scientific and technical information". 2. Khoroshko VO, Cherednichenko BC, Shelest ME X 80 Fundamentals of Information Security / Ed. prof. V.O. Good. - К .: ДУІКТ, 2008.- 186 с. 3. Gerasimenko VA, Melyuk A.Ya. Basics of information protection. - M .; MEPhI, 1997, 537 p. 4. Golego AG, Khoroshko VA Organizational and technical support of information protection. - К .; KMUGA, 1999, - 120 p. 5. Samokhvalov Yu.Ya., Temnikov VO, Khoroshko VO Organizational and technical support of information protection. Textbook / Ed. Prof. VO Khoroshka - K .; NAU, 2002, 207 p. 6. Khoroshko VA, Khoroshko AV, Pirtskhalava PG Methods and means of information protection: Methodical instructions.– K .; KMUGA, 1997, - 38 p. 1. Law of Ukraine on Information. http://zakon4.rada.gov.ua/laws/show/2657-12; 2. The Constitution of Ukraine. http://zakon4.rada.gov.ua/laws/show/254%D0%BA/96-%D0%B2%D1%80 3. Law of Ukraine On State Secrets. http://zakon4.rada.gov.ua/laws/show/3855-12 4. Law of Ukraine On Approval of the Rules for the Production of Securities Forms and Strict Accounting Documents. http://zakon3.rada.gov.ua/laws/show/z0008-94;

Design of Critical Infrastructure Objects Security Systems and State Secrets (курсова робота)

Major: Cybersecurity
Code of subject: 6.125.03.E.155
Credits: 2.00
Department: Information Security
Lecturer: Professor Opirskyy Ivan
Semester: 7 семестр
Mode of study: денна
Learning outcomes: ability to demonstrate knowledge of the basics of professionally-oriented disciplines of the specialty in the field of information security, information security, information security management, security of information and communication systems and administrative management of security and cybersecurity. • the ability to use the skills of experimental calculations of characteristics and the choice of elements of a particular automated system, taking into account the required level of information protection in the organization (enterprise); • ability to demonstrate knowledge and understanding of design methodologies, relevant regulations, applicable standards and specifications; • ability to demonstrate knowledge of the current state of affairs and the latest technologies in the field of information technology and information security; • apply knowledge and understanding to identify, formulate and solve technical problems of the specialty, using known methods; • systematically think and apply creative abilities to the formation of fundamentally new ideas; • apply knowledge of technical characteristics, design features, purpose and rules of operation of equipment and facilities to solve technical problems of the specialty; • work effectively both individually and as a team; • combine theory and practice, as well as make decisions and develop a strategy for solving problems of the specialty (specialization), taking into account universal values, social, state and industrial interests; • ability to adapt to new situations and make decisions;
Required prior and related subjects: Ensuring information security of the state Organizational support of technical protection of information Regulatory and legal support of information and cyber security standards and policies Fundamentals of information and cyber security
Summary of the subject: Іntroductory lecture. The purpose and objectives of the course. Protection of state secrets and its main directions Restricted information: concepts and types Division and general characteristics of information by access mode Legislative support for the protection of state secrets. Legislative requirements for information containing features of state secrets, introduced to protect state secrets Organizational and legal measures for the protection and defense of state secrets. Organizational and legal structure of the system of protection of state secrets. Pre-expert stage of classifying information as a state secret. Stage of expert consideration of information to decide on its classification as a state secret. Stage of formalization of the decision. The basic principles of assigning information containing signs of state secrets to various degrees of secrecy. The concept of "admission" and "access" to information with limited access. Forms of admission to state secrets. Organization of access to information constituting a state secret. The procedure for obtaining a special permit for activities related to state secrets. Permission system for access to trade secrets. Mandatory conditions related to ensuring the safety of use, preservation and protection of state secrets. Technical protection of information containing a state secret. Structure and powers of regime-secret bodies. Internal - object mode and its tasks. Subdivisions of the enterprise that solve the problem of organizing the intra-object regime. Organizational means of information protection General grounds for the application of legal liability for the disclosure of state secrets. Criminal liability for disclosure of a state secret. Loss of documents containing a state secret. Administrative liability for violation of the state secret regime. Responsibility for disclosure of state secrets in the legislation of foreign countries. Basic systems for protection of critical infrastructure. Species and subspecies Perimeter security systems for information with limited access Early emergency detection systems for critical infrastructure Access control and management systems at facilities where there is a state secret Other types of information protection systems and objects where there is a state secret (cryptographic protection systems, lightning protection systems, premises protection systems)
Assessment methods and criteria: Laboratory classes, credit (with an oral component) -100 points
Recommended books: 1. Laboratory works on the course "Systems of protection of state secrets". 2. Textbook. Ensuring the information security of the state [Text]: textbook. way. / VS Zachepylo, IR Opirsky and others; Nat. Lviv Polytechnic University. - Lviv: Lviv Publishing House. Polytechnic, 2017 3. Protection of state secrets: textbook. manual / VS Зачепило, З.А. Shandra, I.R. Opirsky, I.Ya. Tishik, L.V. Frost. - Lviv: Lviv Polytechnic Publishing House, 2015. - 168 p. (IBSN 978-617-607-850-0). 1. Laws of Ukraine: "On information", "On state secrets", "On protection of information in automated systems", "On scientific and technical information". 2. Khoroshko VO, Cherednichenko BC, Shelest ME X 80 Fundamentals of Information Security / Ed. prof. V.O. Good. - К .: ДУІКТ, 2008.- 186 с. 3. Gerasimenko VA, Melyuk A.Ya. Basics of information protection. - M .; MEPhI, 1997, 537 p. 4. Golego AG, Khoroshko VA Organizational and technical support of information protection. - К .; KMUGA, 1999, - 120 p. 5. Samokhvalov Yu.Ya., Temnikov VO, Khoroshko VO Organizational and technical support of information protection. Textbook / Ed. Prof. VO Khoroshka - K .; NAU, 2002, 207 p. 6. Khoroshko VA, Khoroshko AV, Pirtskhalava PG Methods and means of information protection: Methodical instructions.– K .; KMUGA, 1997, - 38 p. 1. Law of Ukraine on Information. http://zakon4.rada.gov.ua/laws/show/2657-12; 2. The Constitution of Ukraine. http://zakon4.rada.gov.ua/laws/show/254%D0%BA/96-%D0%B2%D1%80 3. Law of Ukraine On State Secrets. http://zakon4.rada.gov.ua/laws/show/3855-12 4. Law of Ukraine On Approval of the Rules for the Production of Securities Forms and Strict Accounting Documents. http://zakon3.rada.gov.ua/laws/show/z0008-94;

Design of Critical Infrastructure Objects Security Systems and State Secrets

Major: Cybersecurity
Code of subject: 6.125.02.E.136
Credits: 4.00
Department: Information Security
Lecturer: Professor Opirskyy Ivan
Semester: 7 семестр
Mode of study: денна
Learning outcomes: ability to demonstrate knowledge of the basics of professionally-oriented disciplines of the specialty in the field of information security, information security, information security management, security of information and communication systems and administrative management of security and cybersecurity. • the ability to use the skills of experimental calculations of characteristics and the choice of elements of a particular automated system, taking into account the required level of information protection in the organization (enterprise); • ability to demonstrate knowledge and understanding of design methodologies, relevant regulations, applicable standards and specifications; • ability to demonstrate knowledge of the current state of affairs and the latest technologies in the field of information technology and information security; • apply knowledge and understanding to identify, formulate and solve technical problems of the specialty, using known methods; • systematically think and apply creative abilities to the formation of fundamentally new ideas; • apply knowledge of technical characteristics, design features, purpose and rules of operation of equipment and facilities to solve technical problems of the specialty; • work effectively both individually and as a team; • combine theory and practice, as well as make decisions and develop a strategy for solving problems of the specialty (specialization), taking into account universal values, social, state and industrial interests; • ability to adapt to new situations and make decisions;
Required prior and related subjects: Ensuring information security of the state Organizational support of technical protection of information Regulatory and legal support of information and cyber security standards and policies Fundamentals of information and cyber security
Summary of the subject: Іntroductory lecture. The purpose and objectives of the course. Protection of state secrets and its main directions Restricted information: concepts and types Division and general characteristics of information by access mode Legislative support for the protection of state secrets. Legislative requirements for information containing features of state secrets, introduced to protect state secrets Organizational and legal measures for the protection and defense of state secrets. Organizational and legal structure of the system of protection of state secrets. Pre-expert stage of classifying information as a state secret. Stage of expert consideration of information to decide on its classification as a state secret. Stage of formalization of the decision. The basic principles of assigning information containing signs of state secrets to various degrees of secrecy. The concept of "admission" and "access" to information with limited access. Forms of admission to state secrets. Organization of access to information constituting a state secret. The procedure for obtaining a special permit for activities related to state secrets. Permission system for access to trade secrets. Mandatory conditions related to ensuring the safety of use, preservation and protection of state secrets. Technical protection of information containing a state secret. Structure and powers of regime-secret bodies. Internal - object mode and its tasks. Subdivisions of the enterprise that solve the problem of organizing the intra-object regime. Organizational means of information protection General grounds for the application of legal liability for the disclosure of state secrets. Criminal liability for disclosure of a state secret. Loss of documents containing a state secret. Administrative liability for violation of the state secret regime. Responsibility for disclosure of state secrets in the legislation of foreign countries. Basic systems for protection of critical infrastructure. Species and subspecies Perimeter security systems for information with limited access Early emergency detection systems for critical infrastructure Access control and management systems at facilities where there is a state secret Other types of information protection systems and objects where there is a state secret (cryptographic protection systems, lightning protection systems, premises protection systems)
Assessment methods and criteria: Laboratory classes -30 points exam (with oral component) -70 points
Recommended books: 1. Laboratory works on the course "Systems of protection of state secrets". 2. Textbook. Ensuring the information security of the state [Text]: textbook. way. / VS Zachepylo, IR Opirsky and others; Nat. Lviv Polytechnic University. - Lviv: Lviv Publishing House. Polytechnic, 2017 3. Protection of state secrets: textbook. manual / VS Зачепило, З.А. Shandra, I.R. Opirsky, I.Ya. Tishik, L.V. Frost. - Lviv: Lviv Polytechnic Publishing House, 2015. - 168 p. (IBSN 978-617-607-850-0). 1. Laws of Ukraine: "On information", "On state secrets", "On protection of information in automated systems", "On scientific and technical information". 2. Khoroshko VO, Cherednichenko BC, Shelest ME X 80 Fundamentals of Information Security / Ed. prof. V.O. Good. - К .: ДУІКТ, 2008.- 186 с. 3. Gerasimenko VA, Melyuk A.Ya. Basics of information protection. - M .; MEPhI, 1997, 537 p. 4. Golego AG, Khoroshko VA Organizational and technical support of information protection. - К .; KMUGA, 1999, - 120 p. 5. Samokhvalov Yu.Ya., Temnikov VO, Khoroshko VO Organizational and technical support of information protection. Textbook / Ed. Prof. VO Khoroshka - K .; NAU, 2002, 207 p. 6. Khoroshko VA, Khoroshko AV, Pirtskhalava PG Methods and means of information protection: Methodical instructions.– K .; KMUGA, 1997, - 38 p. 1. Law of Ukraine on Information. http://zakon4.rada.gov.ua/laws/show/2657-12; 2. The Constitution of Ukraine. http://zakon4.rada.gov.ua/laws/show/254%D0%BA/96-%D0%B2%D1%80 3. Law of Ukraine On State Secrets. http://zakon4.rada.gov.ua/laws/show/3855-12 4. Law of Ukraine On Approval of the Rules for the Production of Securities Forms and Strict Accounting Documents. http://zakon3.rada.gov.ua/laws/show/z0008-94;

Design of Critical Infrastructure Objects Security Systems and State Secrets

Major: Cybersecurity
Code of subject: 6.125.03.E.153
Credits: 4.00
Department: Information Security
Lecturer: Professor Opirskyy Ivan
Semester: 7 семестр
Mode of study: денна
Learning outcomes: ability to demonstrate knowledge of the basics of professionally-oriented disciplines of the specialty in the field of information security, information security, information security management, security of information and communication systems and administrative management of security and cybersecurity. • the ability to use the skills of experimental calculations of characteristics and the choice of elements of a particular automated system, taking into account the required level of information protection in the organization (enterprise); • ability to demonstrate knowledge and understanding of design methodologies, relevant regulations, applicable standards and specifications; • ability to demonstrate knowledge of the current state of affairs and the latest technologies in the field of information technology and information security; • apply knowledge and understanding to identify, formulate and solve technical problems of the specialty, using known methods; • systematically think and apply creative abilities to the formation of fundamentally new ideas; • apply knowledge of technical characteristics, design features, purpose and rules of operation of equipment and facilities to solve technical problems of the specialty; • work effectively both individually and as a team; • combine theory and practice, as well as make decisions and develop a strategy for solving problems of the specialty (specialization), taking into account universal values, social, state and industrial interests; • ability to adapt to new situations and make decisions;
Required prior and related subjects: Ensuring information security of the state Organizational support of technical protection of information Regulatory and legal support of information and cyber security standards and policies Fundamentals of information and cyber security
Summary of the subject: Іntroductory lecture. The purpose and objectives of the course. Protection of state secrets and its main directions Restricted information: concepts and types Division and general characteristics of information by access mode Legislative support for the protection of state secrets. Legislative requirements for information containing features of state secrets, introduced to protect state secrets Organizational and legal measures for the protection and defense of state secrets. Organizational and legal structure of the system of protection of state secrets. Pre-expert stage of classifying information as a state secret. Stage of expert consideration of information to decide on its classification as a state secret. Stage of formalization of the decision. The basic principles of assigning information containing signs of state secrets to various degrees of secrecy. The concept of "admission" and "access" to information with limited access. Forms of admission to state secrets. Organization of access to information constituting a state secret. The procedure for obtaining a special permit for activities related to state secrets. Permission system for access to trade secrets. Mandatory conditions related to ensuring the safety of use, preservation and protection of state secrets. Technical protection of information containing a state secret. Structure and powers of regime-secret bodies. Internal - object mode and its tasks. Subdivisions of the enterprise that solve the problem of organizing the intra-object regime. Organizational means of information protection General grounds for the application of legal liability for the disclosure of state secrets. Criminal liability for disclosure of a state secret. Loss of documents containing a state secret. Administrative liability for violation of the state secret regime. Responsibility for disclosure of state secrets in the legislation of foreign countries. Basic systems for protection of critical infrastructure. Species and subspecies Perimeter security systems for information with limited access Early emergency detection systems for critical infrastructure Access control and management systems at facilities where there is a state secret Other types of information protection systems and objects where there is a state secret (cryptographic protection systems, lightning protection systems, premises protection systems)
Assessment methods and criteria: Laboratory classes -30 points exam (with oral component) -70 points
Recommended books: 1. Laboratory works on the course "Systems of protection of state secrets". 2. Textbook. Ensuring the information security of the state [Text]: textbook. way. / VS Zachepylo, IR Opirsky and others; Nat. Lviv Polytechnic University. - Lviv: Lviv Publishing House. Polytechnic, 2017 3. Protection of state secrets: textbook. manual / VS Зачепило, З.А. Shandra, I.R. Opirsky, I.Ya. Tishik, L.V. Frost. - Lviv: Lviv Polytechnic Publishing House, 2015. - 168 p. (IBSN 978-617-607-850-0). 1. Laws of Ukraine: "On information", "On state secrets", "On protection of information in automated systems", "On scientific and technical information". 2. Khoroshko VO, Cherednichenko BC, Shelest ME X 80 Fundamentals of Information Security / Ed. prof. V.O. Good. - К .: ДУІКТ, 2008.- 186 с. 3. Gerasimenko VA, Melyuk A.Ya. Basics of information protection. - M .; MEPhI, 1997, 537 p. 4. Golego AG, Khoroshko VA Organizational and technical support of information protection. - К .; KMUGA, 1999, - 120 p. 5. Samokhvalov Yu.Ya., Temnikov VO, Khoroshko VO Organizational and technical support of information protection. Textbook / Ed. Prof. VO Khoroshka - K .; NAU, 2002, 207 p. 6. Khoroshko VA, Khoroshko AV, Pirtskhalava PG Methods and means of information protection: Methodical instructions.– K .; KMUGA, 1997, - 38 p. 1. Law of Ukraine on Information. http://zakon4.rada.gov.ua/laws/show/2657-12; 2. The Constitution of Ukraine. http://zakon4.rada.gov.ua/laws/show/254%D0%BA/96-%D0%B2%D1%80 3. Law of Ukraine On State Secrets. http://zakon4.rada.gov.ua/laws/show/3855-12 4. Law of Ukraine On Approval of the Rules for the Production of Securities Forms and Strict Accounting Documents. http://zakon3.rada.gov.ua/laws/show/z0008-94;