Guaranteeability of Automated Systems

Major: Information Security Systems and Automation of Information Processing
Code of subject: 7.125.02.O.002
Credits: 4.00
Department: Information Security
Lecturer: D.Sc., prof. Prof. Department of Information Protection Mykytyn Halyna Vasylivna
Semester: 1 семестр
Mode of study: денна
Learning outcomes: As a result of studying the discipline, the student must be able to demonstrate the following learning outcomes: 1. Have: the functional structure of the warranty of automated systems; types and forms of information presentation, information processing processes in the automated system; 2. Know the classification of objects of information protection, potential threats to its security in the automated system; 3. Based on the analysis of known approaches to information protection in the automated system to master the principles of designing a comprehensive security system at the level of models, methods and tools in accordance with applicable regulations; 4. Be able to develop guidelines for "Integrated information security system in automated systems" 5. Be able to create a methodology for assessing the level of information security in an automated system in accordance with the threats to confidentiality, integrity, accessibility; 6. Be able to design information protection in automated information processing systems with limited access on the concept of "object - threat - protection" on the basis of system, regulatory, integrated models.
Required prior and related subjects: Previous training programs: Databases and knowledge; Computer information processing; Information Technology. Related training programs: Design of complex information security systems; Methods and means of information protection in computer networks.
Summary of the subject: Abstract of the discipline. The discipline develops the issue of ensuring the warranty of automated systems in the context of designing integrated information security systems. Objects of information protection are: information resources; information systems; information processes; information networks, information lifecycle management and information security system. Potential security threats to information processing automation are analyzed. Methods of protection of processes of automation of information processing with limited access are presented. The system approach to designing of complex system of information protection in the automated system of information processing is considered. The principles of construction of information protection systems in complex means of automation (KZA) of information processing are analyzed. Means of management of protection of information against unauthorized access to KZA are considered. Models of information protection in information technologies at the level of: resources, systems, processes, networks, management are presented.
Assessment methods and criteria: Methods of diagnostics of knowledge The method of knowledge diagnosis is test control (TC). It covers the main issues of the disciplines, allows the student to take a comprehensive approach to creating a system of automation of information processing with limited access and, on this construction of a comprehensive information security system in accordance with threats and based on the principles of systems analysis. one ticket covers: 5 questions; for each question - 3 answers; one of the three is considered correct.
Recommended books: Recommended Books Basic 1. Domarev VV Information technology security. Methodology for creating protection systems. - TID Dia Soft. - 2002. - 688 p. 2. Zegjda DP Fundamentals of information systems security / D.P. Zegjda, A.M. Ivashko. - Moscow: Hotline - Telecom, 2000. - 452 p. 3. Gerasimenko VA Information protection in automated information processing systems. In 2 books: Book. 1. - M .: Energoatomizdat, 1994. 4. Gerasimenko VA Information protection in automated information processing systems. In 2 books: Book. 2. - M .: Energoatomizdat, 1994. 5. Romanets Yu.V., Timofeev Yu.A., Shangin VF Information protection in computer systems and networks / Ed. V.F. Shangina. - Moscow: Radio and Communication, 2001. 6. Methods and means of information protection. In 2 volumes / Lenkov SV, Peregudov DA, Khoroshko VA, ed. V.A. Good. - K .: Arius, 2008. - Volume 1. Unauthorized receipt of information. - 464 p. 7. Methods and means of information protection. In 2 volumes / Lenkov SV, Peregudov DA, Khoroshko VA, ed. V.A. Good. - K .: Arius, 2008. - Volume 2. Information security. - 344 p. 8. Voinov BS Information technologies and systems: Monograph. Book 1: Methodology of synthesis of new solutions / NNGU. - Nizhny Novgorod: NNGU, 2001. - 404 p .; Book 2: Applied system research / NNGU. - Nizhny Novgorod: NNGU, 2001. - 272 p. 9. Mikitin GV Security strategy of cyberphysical systems / Dudykevich VB, Maksimovich VN, Mikitin GV // Information technologies and information protection in information and communication systems: monograph / ed. VS Ponomarenko. - H .: Published by Shchedra Sadiba Plus LLC. - 2016. - P. 286 - 300. 10. Mikitin GV Complex security systems of cybernetic space of cyberphysical system on the basis of the concept “object - threat - protection” / Information technologies: problems and prospects: monograph / VB Dudykevych, GV Mykytyn / for general. ed. VS Ponomarenko. - H .: Type. Rozhko SG, 2017. - 447 p. Auxiliary 1. GOST R IEC 61508-1-2007. Functional safety of electrical, electronic, programmable electronic systems related to safety. Part 1. General requirements (IEC 61508-1: 1998, IDT). - M .: Standardinform. - 2008. - 96 p. 2. SOU-N NSAU 0060: 2010. Industry quality management system. Guarantee capacity of software and hardware complexes of critical purpose. Guidelines of the National Space Agency of Ukraine. - Kyiv, 2011. - 60 p. 3. Mikitin GV System, normative and complex models of information technology protection / GV Mykytyn // Bulletin of the National University "Lviv Polytechnic", Automation, measurement and control. - 2011. - № 695. - P. 126–132. 4. Dudykevych VB Functional security of information technologies: principles, methodology, implementation / VB Dudykevych, GV Mykytyn, O. Ya. Rudnyk // Modern special equipment. - 2013. - №1 (32). - P. 115–125. 5. Mikitin GV Paradigm and the concept of building a multi-level complex security system of cyberphysical systems / VB Dudykevych, VM Maksymovych, GV Mykytyn // Bulletin of the National University "Lviv Polytechnic". Series: Automation, measurement and control. - 2015. - № 852. - P. 3–7 6. Dudykevych V.B., Mykytyn G.V., Kret T.B .. The concept of creating a multi-level complex system of cyber-physical safety systems // Information processing systems. - 2016. - issue № 5 (142). - P. 87 - 93 7. Mikitin GV The concept and basic approach to building an information security system in a multilevel intelligent control system / Dudykevych VB, Mykytyn GV, Kret TB // Information processing systems. - 2016. - issue № 8 (145). - P. 105 - 110 8. Mikitin GV Universal platform for creating information protection system in multilevel intelligent control systems / VB Dudykevych, GV Mykytyn, TB Kret // Bulletin of the National University "Lviv Polytechnic". Series: Automation, measurement and control. - 2016. - № 852. - P. 23–28 9. Dudykevych VB Complex security system of cyberphysical system "iPhone - Wi-Fi, Bluetooth - sensors" / VB Dudykevych, GV Mykytyn, AI Rebets // Information processing systems. - 2017. - № 2 (148). - P. 84–87 10. Mikitin GV The quintessence of security of cyberphysical systems / VB Dudykevych, GV Mykytyn, AI Rebets // Information systems and networks. - 2018. - № 887 - P. 58–69.