Data Protection in Information and Communication Systems

Major: Information and Communication Systems
Code of subject: 6.126.02.E.048
Credits: 5.00
Department: Telecommunication
Lecturer: DSc., Prof. Kyryk M.I.
Semester: 5 семестр
Mode of study: денна
Мета вивчення дисципліни: Formation and development of general and professional competences in the organization of protection of data storage and transmission in information and communication systems, application of measures and means aimed at technical protection of information, prevention of disclosure, leakage and illegal acquisition of information.
Завдання: General competences: the ability to solve complex specialized tasks and practical problems in the field of information systems and technologies, or in the learning process, characterized by the complexity and uncertainty of conditions that require the application of theories and methods of information technologies. Professional competences: ability to design, develop, debug and improve system, communication and hardware support of information systems and technologies, the Internet of Things (IoT), computer-integrated systems and system network structure, their management; the ability to use modern information systems and technologies (production, decision support, intelligent data analysis, and others), cyber security methods and techniques when performing functional tasks and duties; the ability to develop conceptual and mathematical models of micro/nano-devices and components of smart systems, perform their parameterization and carry out verification against the requirements of the technical task; the ability to deploy, administer and support information systems based on network technologies and the ability to develop technical documentation.
Learning outcomes: Ability to analyze a design or functioning object and its subject area. Ability to apply standards in the field of information systems and technologies when developing functional profiles, building and integrating systems, products, services and elements of the organization's infrastructure. Ability to design, develop, debug and improve system, communication and software hardware of information systems and technologies, the Internet of Things (IoT), computer-integrated systems and system network structure, their management. The ability to design, develop and use the means of implementing information systems, technologies and information communications (methodical, informational, algorithmic, technical, software and others). Ability to use modern information systems and technologies (production, decision support, intelligent data analysis, and others), cyber security methods and techniques while performing functional tasks and duties. Ability to select, design, deploy, integrate, manage, administer and support information systems, technologies and information communications, services and infrastructure of the organization. The ability to apply methods and tools of modern information technologies for the design, development and deployment of applied information systems in various fields The ability to deploy, administer and support information systems based on network technologies and the ability to develop technical documentation
Required prior and related subjects: Basics of information technologies Embedded systems Operating systems and network technologies Technologies of information and communication networks Web-oriented Internet technologies
Summary of the subject: The aim of the discipline is to provide students with theoretical and practical knowledge and skills in information protection in information and communication systems and networks. The student must know the main types and types of threats, security protocols, the main software and hardware means of information protection in information and communication networks, the implementation of information confidentiality protection, the implementation of information integrity protection, the organization of information availability.
Опис: Basic concepts of information security. Confidentiality, integrity, availability. Data privacy protection. Ensuring data integrity. Ensuring data availability. Data protection measures in information and communication systems. Protection of cyber security domains. Threats, Vulnerabilities and Attacks. In-depth analysis of network attacks. Network protection. Security infrastructure in information and communication systems and networks. Security monitoring. Security data analysis tools. Incident response and handling
Assessment methods and criteria: Running check: The defense of laboratory work is carried out in writing (in PDF format of a form that contains information about the student and 5 questions to which the student must answer), or in oral form in the format of a survey (the student, according to a pre-approved list of questions, answers any what five questions). Each question is valued at one point. As a result of the correct answer to all questions, the student receives 5 points. The sum of points is divided by a correction factor of 2.25. Examination control consists of two components: 1) written - - is made in writing in PDF format. The PDF form contains information about the student and 12 questions to which the student must provide answers. The first 5 questions are test questions with one correct answer and are valued at 3 points, the next 5 questions are test questions with two or more correct answers and are valued at 5 points, the last two questions require the correct answer and are valued at 5 points. 2) oral - conducted in the form of a survey, where the student answers any five questions according to a pre-approved list of questions. Each question is worth 2 points.
Критерії оцінювання результатів навчання: Defense of laboratory work is carried out in writing in PDF format. The PDF form contains information about the student and 5 questions to which the student must provide answers. Each question is valued at one point. As a result of the correct answer to all questions, the student receives 5 points. Examination control consists of two components: 1) written - - is made in writing in PDF format. The PDF form contains information about the student and 12 questions to which the student must provide answers. The first 5 questions are test questions with one correct answer and are valued at 3 points, the next 5 questions are test questions with two or more correct answers and are valued at 5 points, the last two questions require the correct answer and are valued at 5 points. 2) oral - conducted in the form of a survey, where the student answers any five questions according to a pre-approved list of questions. Each question is worth 2 points.
Recommended books: 1. Buryachok V. L. Information and cyberspace: security problems, methods and means of combat. [Manual]. / V. L. Buryachok, S. V. Tolyupa, V. V. Semko, L. V. Buryachok, N. V. P. M. Skladannyi. Lukova-Chuiko/ – K.: DUT - KNU, 2016. – 178 p. ISBN 978–617–7092–78–9. 2. Buryachok V.L., Tolyupa S.V., Anosov A.O., Kozachok V.A., Lukova-Chuiko N.V. System analysis and decision-making in information security: a textbook. / V.L. Buryachok, S.V. Tolyupa, A.O. Anosov, V.A. Kozachok, N.V. Lukova-Chuiko / - K.:DUT, 2015. - 345 p. 3. Bogush V.M., Kudin A.M. Information security from A to Z: 3000 terms and concepts. - K.: MOU, 1999. - 456 p. 4. Cisco systems. Educational materials of Cisco academies for the Cybersecurity Essentials course https://www.netacad.com/courses/cybersecurity/cybersecurity-essentials/ 5. Cisco systems. Cisco network academies training materials for the CCNA Cybersecurity Operations course https://www.netacad.com/courses/cybersecurity/cyberops-associate/ 6. Buryachok, V. L. Information and cyber security: socio-technical aspect: textbook / [V. L. Buryachok, V. B. Tolubko, V. O. Khoroshko, S. V. Tolyupa]; in general ed. Dr. Tech. of Sciences, by Professor V. B. Tolubka.— K.: DUT, 2015.— 288 p. 7. Kuznetsov O.O. Protection of information in information systems: study. help./ O.O. Kuznetsov, S.P. Yevseev, O.G. Korol.-Kharkiv: Khneu, 2011.-512 p.