Intellectual Objects Security Systems

Major: Administration of Cybersecurity Systems
Code of subject: 7.125.04.E.033
Credits: 4.00
Department: Information Security
Lecturer: Ph.D., prof., Prof. Department of Information Protection Mykytyn Halyna Vasylivna
Semester: 2 семестр
Mode of study: денна
Learning outcomes: As a result of studying the discipline, the student must be able to demonstrate the following learning outcomes: 1. Have the classification and architecture of automated (AS) systems: information-analytical, cyberphysical, expert systems, decision support systems; 2. Know the classification of communication systems (CS) and features of wireless networks: GSM, CDMA, WiMAX, LTE; 3. Know the structure of a comprehensive security system of an intellectual object on the basis of an integrated model and be able to adapt it to any subject area; 4. Be able to create external security of the AU and the COP according to the concept of "object - threat - protection" using the latest tools; 5. Be able to create internal security of the AU and the COP according to the concept of "object - threat - protection" with the use of secure hardware and software; 6. To be able to apply the model of multilevel protection of information in technologies of intellectual object; 7. Be able to apply a mandated security policy for intelligent objects.
Required prior and related subjects: Previous academic disciplines: Methods and means of information protection; Integrated systems of authorized access. Related disciplines: Design of security systems for critical infrastructure and state secrets.
Summary of the subject: Abstract. 1. The structure of the complex security system of the intellectual object on the example of the intelligent transport system "airport" is built on the principles of system analysis. Real-time data from sensors is transmitted by wireless communication technologies to automated systems for processing, comparing the current parameters of the site with the normalized and decision-making to manage the state of the intelligent object. Technologies of functioning of the intellectual object - sensors (D), automated systems (AS) and communication systems (CS) are combined into a single security complex with the ability to increase the level of detection and prevention of emergencies and prevent intrusion into the controlled areas of the airport. in turn, increases the integrated level of airport security. 2. Integrated security model of the AU and CS - is a system solution that allows you to design a comprehensive system of information protection of the object with the possibility of centralized user access, security system protection against NSD: controllable and interconnected barriers, overlapping with guarantee strength aimed at loss or modification of information. The system approach corresponds to the construction of a comprehensive system of information protection and allows to build a reliable system of equal and interdependent obstacles in the way of the violator with the possibility of reasonable determination of quantitative and qualitative parameters of protection. Multi-level protection combines all parts of protection into a single, permanent mechanism. 3. The model of multilevel security of the object operates at the level of protection circuits that block the same channels of unauthorized access to information and communication technologies that support the functioning of the intelligent transport system - the airport. The application of the mandated security policy based on the analysis of the features of the intellectual object is substantiated. The main issues of the discipline: 1. Conditions for safe operation of an intellectual object (smart environmental monitoring; smart education; smart energy; smart transport system, etc.) 2. Functional purpose of the AU, their architecture and classification 3. Functional purpose of CS, their architecture and classification 4. The structure and content of the integrated security system (CSS) of the intellectual object, the stages of construction 5. Technologies for information protection at the external level of the BCC 6. Information protection technologies at the internal level of the BCC 7. The content of the model of multilevel information protection in: sensors, speakers, CS 8. The main threats at the external level of security of the AU 9. The main threats at the internal security level of the AU 10. Structure and content of the mandated security policy
Assessment methods and criteria: Lectures. Practical. Independent work. Methods of diagnostics of knowledge. The method of knowledge diagnosis is test control (TC). It covers the main issues of the discipline, allows the student to take a comprehensive approach to creating a security system of the intellectual object and, on this basis, to build a comprehensive system of information protection in the intellectual system in accordance with threats and based on the principles of system analysis. The content of one ticket covers: 5 questions; for each question - 3 answers; one of the three is considered correct.
Recommended books: RECOMMENDED BOOKS 1. Bobalo Yu.Ya .. Strategic security of the system “object - information technology”: [monograph] / [Bobalo Yu.Ya., Dudykevych VB, Mykytyn GV ] - Lviv: Lviv Polytechnic National University Publishing House. - 2020. - 260 p. 2. Sarajevo AD, Shcherbina OA System analysis and modern information technologies // Proceedings of the Crimean Academy of Sciences. - Simferopol: SONAT, 2006. - P. 47–59. 3. Grayvoronsky MV Security of information and communication systems / Graivoronsky MV, Novikov OM - К .: Вид. BHV group, 2009. - 608 p. 4. Domarev VV Information technology security. System approach. - К .: ООО «ТИД« ДС », 2004. - 992 с. 5. A.M. Petrakov, VP Мельников, С.А. Клеймонов. Information security and information protection: Textbook. allowance. - M .: Publishing Center "Academy", 2008. - 186 p. 6. Garasimchuk OI, Dudikevich VB, Romaka VA Integrated systems of authorized access: Textbook. manual. - Lviv: Lviv Polytechnic Publishing House, 2010. - 212 p. 7. Klaus Finkenzeller. RFID Handbook. - М .: Издательский дом «Додека - XXI», 2008. - 496 с. 8. Antonyuk AA Fundamentals of information security in automated systems: Textbook. way. - K: Publishing House "KM Academy", 2003. - 243 p. 9. O. Sinenko, N. Kutsevich, E. Andreev. SCADA systems. Inside view. - К .: РТСофт, 2004. - 214 с. 10. V.D. Курушин. Fundamentals of information technology. - К .: РТСофт, 2009. - 272 с. 11. V. Solovyov, A. Klimovich. Logical design of digital systems, based on programmable logic integrated circuits. - M .: Hotline - Telecom, 2008. - 376 p. 12. Shcherbakov A. Yu. Introduction to the theory and practice of computer security. - M .: publisher Molgacheva SV, 2001. –352 p. 13. R. Sheldon, D. Moye. MySQL. Basic course. - М .: Программистам от программистов, 2008. –880 с. 14. A. Berkut, A. Rulnov. Systems of automatic control of technological parameters. - Moscow: Publishing House of the Association of Construction Universities, 2005. - 144 p. 15. Golubchenko OL Information security policy. Luhansk: published by SNK them. V.Dalya, 2009. –300 p. 16. DSTU 3396.0-96. Information protection. Technical protection of information. Substantive provisions. 17. DSTU 3396.1-96. Information protection. Technical protection of information. The order of works. 18. DSTU 3892-1999. “Means of engineering and technical strengthening and protection of objects. Terms and definitions ”. 19. DSTU 3960-2000. “Alarm systems. Security and fire alarm systems. Terms and definitions ”. 20. DSTU 78.11.004-2000. “Means of engineering and technical strengthening and protection of objects. Objects protected by physical protection. General technical requirements ”. 21. DSTU 78.11.008-2001. “Means of engineering and technical strengthening and protection of objects. Protective cabin. General technical requirements and test methods ”. 22. Sun TZI 1.1-002-99. General provisions for the protection of information in computer systems from unauthorized access. 23. ND TZI 1.1-002-99 General provisions for the protection of information in computer systems from unauthorized access. Approved by the order of the State Security Service of Ukraine of April 28, 1999 № 22. 24. ND TZI 1.4-001-2000 Standard regulations on information protection service in the automated system. Approved by the order of DSTSZI SB of Ukraine dated 04.12.2000 № 53. 25. ND TZI 2.1-001-2001 Creation of complexes of technical protection of information. Certification of complexes. Substantive provisions. Approved by the order of DSTSZI SB of Ukraine dated 09.02.2001 № 2. 26. ND TZI 2.5-004-99 Criteria for assessing the security of information in computer systems from unauthorized access. Approved by the order of the State Security Service of Ukraine of April 28, 1999 № 22

Intellectual Objects Security Systems (курсовий проєкт)

Major: Administration of Cybersecurity Systems
Code of subject: 7.125.04.E.035
Credits: 3.00
Department: Information Security
Lecturer: Ph.D., prof., Prof. Department of Information Protection Mykytyn Halyna Vasylivna
Semester: 2 семестр
Mode of study: денна
Learning outcomes: Creation of security systems for intellectual objects: Methodical instructions for the course project in the disciplines: "Security systems for intellectual objects" and "Security of cyberphysical systems" for students of the first (bachelor's) level of higher education specialty 125. Cybersecurity and the second (master's) level higher education specialty 125. Cybersecurity / Incl .: VB Дудикевич, Б.М. Berezyuk, OI Гарасимчук, Г.В. Mykytyn, - Lviv: Lviv Polytechnic National University, 2021. - 58 p. The purpose of the course project: Creation of a comprehensive security system (CSS) of an intellectual object according to: system approach; models of integrated security of automated and communication systems; structures of multilevel and multilevel information protection in information and communication technologies. The course project on creation of KSB provides: Object of study: * Protection of information in technologies to support the functioning of the intelligent object - automated systems (AS) and communication systems (CS) on the example of the intelligent transport system of the airport. Subject of study: * Comprehensive security system of the intellectual object; * External security of the AU and the COP at the level of the concept of "object - threat - protection". * Internal security of the AU and the COP at the level of the concept of "object - threat - protection". Research method - a method of system analysis. Tasks: * To analyze the architecture and functional purpose of automated systems and communication systems of wireless communication as technologies for safe operation of an intellectual object; * Create a comprehensive security system of the intellectual object based on the model of integrated security, which operates at the level of protection circuits that block the same channels of unauthorized access to information and communication technologies of the intelligent transport system; * Describe the algorithm of the model of the integrated security system of the intellectual object. Instructions for the course project: 1. Analysis of the architecture and functional purpose of automated systems and communication systems of wireless communication of an intellectual object 2. The structure of a comprehensive security system of intelligent object technologies based on an integrated model 3. Model of multilevel protection of information in technologies of functioning of intellectual object and mandate security policy 4. Conclusions 5. Control questions 6. Topics for the course project 5. List of recommended sources. The order of execution of the course project: 1. Acquaintance with the content of methodical instructions and the individual task - the intellectual object in which the information with limited access (IzOD) in technologies of support circulates: sensors, automated and communication systems 2. Classification of automated systems and communication systems that are tools for the operation of an intellectual object, and analysis of their architecture 3. Creation of a complex security system of technologies of intellectual object on the basis of integrated model according to the individual task 4. Construction of a model of multilevel protection of information in technologies of intellectual object; disclosure of the concept of "object - threat - protection" at the internal and external levels of security; justification for the choice of information security policy. 5. Conclusions on the creation of CSB technologies to support the intellectual object and the model of multilevel information protection.
Required prior and related subjects: Previous disciplines: Integrated systems of authorized access. Related disciplines: Design of security systems for critical infrastructure and state secrets.
Summary of the subject: Abstract. Safety of technologies of functioning of intelligent transport system of the airport - automated and communication systems (AS, KS) remains an actual question in the conditions of intellectualization of a society on the basis of information technologies. It is important for an intellectual object to keep information with limited access and to protect it from acquaintance, modification, destruction. These issues are considered in the National Transport Strategy of Ukraine until 2030, in particular in the part - safe for society, environmentally friendly and energy efficient transport. The list of tasks to solve this problem: the introduction of the latest security technologies, cyber security systems; introduction of aviation security information technologies in order to create an effective flight safety management system. Airport security has always been paramount, and its need has always been very important. The complexity of providing security systems for such an intelligent system as the airport is due to the impact on its functioning of a range of external factors: identification of passengers and personnel in the territory, identification of threats, video surveillance of personnel and passengers in the territory, transmission of video information for the purpose of prompt decision-making. The airport security management process should ensure: the intensity and efficiency of air passenger and freight traffic; safety of the airspace above the airport and in the adjacent areas: safety on its territory, taking into account the aerodrome area both during normal operation and in case of emergencies. In this context, the development and implementation of intelligent transport systems is an urgent issue. Achieving these goals is possible provided the safe operation of intellectualization technologies - sensors, automated systems and wireless communication systems, which are integrally aimed at improving the security of intelligent objects, by detecting, preventing, neutralizing threats of unauthorized access (NSD), their categorization by danger and , on this basis, the definition of the category of emergency and management of the state of the object and the automation of security notification. Contents of the course project INTRODUCTION 1. ANALYSIS OF ARCHITECTURE AND FUNCTIONAL PURPOSE OF AUTOMATED AND COMMUNICATION SYSTEMS OF WIRELESS COMMUNICATION INTELLECTUAL OBJECTIVE 1.1 Automated systems: classification and generalized architecture …………………………………………………………… 1.1.1 Information and analytical systems 1.1.2 Cyberphysical systems 1.1.3 Decision support systems 1.1.4 Expert systems 1.2 Wireless communication systems: GSM, CDMA, WiMAX, LTE ……………………………………………………… .. 2. STRUCTURE OF THE COMPREHENSIVE SYSTEM OF SECURITY OF TECHNOLOGIES OF INTELLECTUAL OBJECT ON THE BASIS OF THE INTEGRATED MODEL 2.1 External security of the AU and the COP according to the concept of "object-threat-protection" ……………………………………………………………… 2.1.1Access control systems 2.1.2 Radio frequency identification systems 2.1.3 Perimeter security systems and intelligent video surveillance 2.1.4 Biometric systems 2.2 Internal security of the AU and the COP according to the concept of "object-threat-protection" …………………………………………………… ... 2.2.1 Hardware 2.2.2 Software 3. MODEL OF MULTILEVEL INFORMATION PROTECTION IN TECHNOLOGIES OF INTELLECTUAL OBJECT FUNCTIONING 3.1 Model of multilevel protection of technologies of functioning of intellectual object ………………………………………… .. 3.2 Integrated information security policy of the object ……… CONCLUSIONS CHECKLIST QUESTIONS ……………………………………… TOPICS FOR THE COURSE PROJECT LIST OF RECOMMENDED LITERATURE
Assessment methods and criteria: Evaluation methods. Course project defense.
Recommended books: LIST OF RECOMMENDED LITERATURE 1. Bobalo Yu.Ya .. Strategic security of the system “object - information technology”: [monograph] / [Bobalo Yu.Ya., Dudykevych VB, Mykytyn GV ] - Lviv: Lviv Polytechnic National University Publishing House. - 2020. - 260 p. 2. Sarajevo AD, Shcherbina OA System analysis and modern information technologies // Proceedings of the Crimean Academy of Sciences. - Simferopol: SONAT, 2006. - P. 47–59. 3. Grayvoronsky MV Security of information and communication systems / Graivoronsky MV, Novikov OM - К .: Вид. BHV group, 2009. - 608 p. 4. Domarev VV Information technology security. System approach. - К .: ООО «ТИД« ДС », 2004. - 992 с. 5. A.M. Petrakov, VP Мельников, С.А. Клеймонов. Information security and information protection: Textbook. allowance. - M .: Publishing Center "Academy", 2008. - 186 p. 6. Garasimchuk OI, Dudikevich VB, Romaka VA Integrated systems of authorized access: Textbook. manual. - Lviv: Lviv Polytechnic Publishing House, 2010. - 212 p. 7. Klaus Finkenzeller. RFID Handbook. - М .: Издательский дом «Додека - XXI», 2008. - 496 с. 8. Antonyuk AA Fundamentals of information security in automated systems: Textbook. way. - K: Publishing House "KM Academy", 2003. - 243 p. 9. O. Sinenko, N. Kutsevich, E. Andreev. SCADA systems. Inside view. - К .: РТСофт, 2004. - 214 с. 10. V.D. Курушин. Fundamentals of information technology. - К .: РТСофт, 2009. - 272 с. 11. V. Solovyov, A. Klimovich. Logical design of digital systems, based on programmable logic integrated circuits. - M .: Hotline - Telecom, 2008. - 376 p. 12. Shcherbakov A. Yu. Introduction to the theory and practice of computer security. - M .: publisher Molgacheva SV, 2001. –352 p. 13. R. Sheldon, D. Moye. MySQL. Basic course. - М .: Программистам от программистов, 2008. –880 с. 14. A. Berkut, A. Rulnov. Systems of automatic control of technological parameters. - Moscow: Publishing House of the Association of Construction Universities, 2005. - 144 p. 15. Golubchenko OL Information security policy. Luhansk: published by SNK them. V.Dalya, 2009. –300 p. 16. DSTU 3396.0-96. Information protection. Technical protection of information. Substantive provisions. 17. DSTU 3396.1-96. Information protection. Technical protection of information. The order of works. 18. DSTU 3892-1999. “Means of engineering and technical strengthening and protection of objects. Terms and definitions ”. 19. DSTU 3960-2000. “Alarm systems. Security and fire alarm systems. Terms and definitions ”. 20. DSTU 78.11.004-2000. “Means of engineering and technical strengthening and protection of objects. Objects protected by physical protection. General technical requirements ”. 21. DSTU 78.11.008-2001. “Means of engineering and technical strengthening and protection of objects. Protective cabin. General technical requirements and test methods ”. 22. Sun TZI 1.1-002-99. General provisions for the protection of information in computer systems from unauthorized access. 23. ND TZI 1.1-002-99 General provisions for the protection of information in computer systems from unauthorized access. Approved by the order of the State Security Service of Ukraine of April 28, 1999 № 22. 24. ND TZI 1.4-001-2000 Standard regulations on information protection service in the automated system. Approved by the order of DSTSZI SB of Ukraine dated 04.12.2000 № 53. 25. ND TZI 2.1-001-2001 Creation of complexes of technical protection of information. Certification of complexes. Substantive provisions. Approved by the order of DSTSZI SB of Ukraine dated 09.02.2001 № 2. 26. ND TZI 2.5-004-99 Criteria for assessing the security of information in computer systems from unauthorized access. Approved by the order of the State Security Service of Ukraine of April 28, 1999 № 22