Network Security

Major: Information and Communication Systems
Code of subject: 6.126.02.E.062
Credits: 6.00
Department: Telecommunication
Lecturer: Dr.S. Kyryk Marian Ivanovych
Semester: 7 семестр
Mode of study: денна
Learning outcomes: mastered features of information security organization; knowledge of methods and means of ensuring a comprehensive information protection system; knowledge of methods of development and implementation of information security systems; knowledge of information threats in information and communication systems and networks; knowledge of the main security protocols and principles of the functioning of protection systems; knowledge of basic software and hardware means of information protection in information and communication systems and networks; theoretical and practical approaches to the development of the information security subsystem; the ability to determine the causes, types, sources and channels of leakage, distortion of information. carry out a security analysis of the information and communication system or network and eliminate possible ways of unauthorized access; implement organizational and program measures to increase the level of security of information storage.
Required prior and related subjects: Security of information and communication systems Deployment of information and communication systems Architecture of information and communication systems Integration and testing of information and communication systems Design of information and communication systems Project management systems
Summary of the subject: The development of the field of telecommunications is one of the activities of modern society, which ensures the provision of a wide range of services to the population and is characterized as a positive factor in the development of the market of information and communication networks and systems. Humanity is experiencing a real boom in the development and implementation of new methods and technologies for the transmission, processing and storage of information, which led to the globalization of telecommunication networks and the creation of a single global information space. But the rapid deployment of information communication networks of the new generation forces us to consider the role and importance of information protection in a fundamentally new way. The study of the educational discipline "Network Security" occupies an important place in the system of training bachelors, who, carrying out a number of practical exercises in professionally oriented directions with the help of modern methods and techniques, will correctly implement the necessary solutions in the field of information and communication systems and networks, using knowledge, received on the basis of the study of general scientific and professionally oriented disciplines and will carry out their implementation in practical activities.
Assessment methods and criteria: Running check: The defense of laboratory work is carried out in writing (in PDF format of a form that contains information about the student and 5 questions to which the student must answer), or in oral form in the format of a survey (the student, according to a pre-approved list of questions, answers any what five questions). Each question is valued at one point. As a result of the correct answer to all questions, the student receives 5 points. The sum of points is divided by a correction factor of 2.25. Examination control consists of two components: 1) written - - is made in writing in PDF format. The PDF form contains information about the student and 12 questions to which the student must provide answers. The first 5 questions are test questions with one correct answer and are valued at 3 points, the next 5 questions are test questions with two or more correct answers and are valued at 5 points, the last two questions require the correct answer and are valued at 5 points. 2) oral - conducted in the form of a survey, where the student answers any five questions according to a pre-approved list of questions. Each question is worth 2 points.
Recommended books: 1. The Law of Ukraine "On the Protection of Information in Automated Systems" // Bulletin of the Verkhovna Rada of Ukraine, 1994. - No. 31. - P. 286. 2. Resolution of the Verkhovna Rada of Ukraine of January 16, 1997 N 3/97-BP "On Approval of the National Security Concept of Ukraine" 3. Resolution of the Cabinet of Ministers of Ukraine "On Approval of the Concept of Technical Protection of Information in Ukraine" dated October 8, 1997. 4. DSTU 3396.0-96 Information protection. Technical protection of information. Substantive provisions. 5. DSTU 3396.1-96 Information protection. TSI The order of work. 6. DSTU 3396.2-96 Information protection. TSI Terms and definitions. 7. Instructions on the procedure for accounting, storage and use of documents, files, publications and other material carriers of information that contain confidential information that is the property of the state. Approved by the resolution of the Cabinet of Ministers of Ukraine dated 27.11.98. No. 1893 // Official Gazette of Ukraine, 1998. - No. 48. - P. 1764. 8. On approval of the Concept of technical protection of information in Ukraine: Resolution... October 8, 1997 No. 1126 // DVU, 1997. – No. 12. – P. 1714. 1 9. Bakut P.A. Information resources – questions of theory and practice / P.A. Bakut // Scientific and technical information. Series "Organization and methods of information work. - 2007. - No. 11. - P.16-23. 10. Voychyshyn K.S. Creating a system of information resources: standardization and certification - the basis of information infrastructure [Text] / K.S. Voychyshyn // Information technologies and systems.– 2008.– Vol.5, No. 1-2.– P.69-83. 11. 27. Galatenko V.A. Basics of information security [Text] / V.A. Galatenko.– M.: Internet University of Information Technologies, 2006.– 277p. 28. Gerasimenko V.A. Protection of information in automated data processing systems. In 2 books - M., 1994. 29. Golovan S.M. Normative provision of information security / S.M. Golovan, O.S. Petrov, V.O. Khoroshko, D.V. Chirkov, L.M. Shcherbak / Ed. Prof. V.O. Good girl - K.: DUIKT, 2008. - 533 p. 30. Honorovsky I.S. Radio engineering circuits and signals, part 1 / I.S. Honorovsky. - M.: Sovradio, 1967. - 439 p. 12. Gordienko, S. G. Theory and practice of state and non-state structures for the protection of intellectual property in Ukraine in modern conditions [Electronic resource]: course of lectures / S. G. Hordienko; NTUU "KPI". – Electronic text data (1 file: 4.04 MB). - Kyiv: NTUU "KPI", 2011. - 496 p. – Title from the screen. Electronic resource: http://ela.kpi.ua/handle/123456789/17634