Technology Development and Application of Security Systems of Information - Communication Systems

Major: Security of Information and Communication Systems
Code of subject: 7.125.01.E.030
Credits: 5.00
Department: Information Technology Security
Lecturer: Professor, D.Sc. Ihor M. Zhuravel
Semester: 2 семестр
Mode of study: денна
Learning outcomes: Understanding of tools, scientific principles and strategies relevant to diagnosing and analyzing the state of development of cybersecurity at a level that will allow employment in the specialty, the ability to effectively use in practice theoretical knowledge in information security management. Knowledge of methods of analysis, synthesis, optimization and forecasting of quality of processes of functioning of information processes and technologies in the distributed information and communication systems. To develop complexes of means of protection of information and communication systems. Ability to use a variety of methods, including modern information technology, to communicate effectively at the professional and social levels.
Required prior and related subjects: Information security in information and communications systems; Monitoring and auditing of ICS; Methods and tools for cryptanalysis.
Summary of the subject: The information security problems of networks. Information security standards. Authentication technology. Safety provision of operating systems. Firewalls technology. The basic technology of virtual private networks (VPN). Infrastructure of security at the applied level. Analysis of security and reveal of attacks. Security against viruses. Control methods of safety in computer and telecommunication networks.
Assessment methods and criteria: written reports on laboratory works, oral examination, reference work (40%); final control (60% control measure, test), written-oral form (60%).
Recommended books: 1. Горбенко Ю.І. Горбенко І.Д. / Інфраструктура відкритих ключів. Електронний цифровий підпис. Теорія та практика.: Монографія. - Харків. Видавництво «Форт», 2010 – 608 с. 2. Горбенко І.Д., Горбенко Ю.І. / Прикладна криптологія. Теорія, практика, застосування: Монографія. Вид. 2 перероблене і доп. - Харків. Видавництво «Форт», 2012 – 860 с. 3. Герасименко В.А. Защита информации в автоматизированных системах обработки данных. Т.2. - М.: Энергоатомиздат, 1994. 4. Шатт С. Мир компьютерных сетей: Пер. с англ.-К.: В НУ, 1996. 5. Прохоров И.В., Толстой А.И. Телекоммуникационньїе сети: Учебное пособие. М.: МИФИ, 1996; 6. Хейвуд Д. Внутренний мир Windows NT Server 4: Пер. с англ. - К.: Издательство “Диасофт”, 1997: 7. В.Г. Олифер, Н.А. Олифер. Сетевые операционные системы - Спб: Питер, 2001. 8. Введение в криптологию. - Спб.: Питер 2000 9. Автор анонимный. Максимальная безопасность в Linux: Пер. с англ. - К.: Издательство “Диасофт”, 2000.