Information Security Systems

Major: Biotechnical and Medical Apparatus and Systems (Internet of Things)
Code of subject: 7.163.03.O.004
Credits: 5.00
Department: Electronics and Information Technology
Lecturer: Yakovenko Yevheniia I. PhD, associate professor
Semester: 1 семестр
Mode of study: денна
Мета вивчення дисципліни: study of hardware and software information security in infocommunication systems
Завдання: Загальні компетентності: -Здатність до абстрактного мислення, аналізу та синтезу; -Вміння виявляти, ставити та вирішувати проблеми; -Здатність здійснювати пошук та аналізувати інформацію з різних джерел -Здатність генерувати нові ідеї і нестандартні підходи до їх реалізації Фахові компетентності: -Здатність аналізувати питання технічного захисту інформації -Здатність вибрати та проаналізувати систему захисту інформації
Learning outcomes: By the end of the study, learners are expected to be able to: -Understand fundamentals of threats types; -Understand fundamentals of operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications. -Analyze security of information system; -Organize defense of information system
Required prior and related subjects: Prerequisites:Hardware for Information Security Corequisites: Technologies for Corporative Networks Configuration and Administration
Summary of the subject: This course will provide a basic introduction to of all aspects of cyber-security including procedures, communications security, network security, security management and technical issues
Опис: Introduction Subject, purpose and objectives of the course. Basic concepts and analysis of threats to information security of an automated information system Problems of information security of networks. Analysis of threats to network security. Methods of solving information security problems in networks Security policy: basic concepts, structure of the organisation's security policy Information security standards Information security technologies Principles of cryptographic information protection. Cryptographic algorithms Authentication technologies Authentication, authorisation and administration of user actions Security protection of operating systems (OS) Threat classification. Administrative protection measures. Architecture of the OS security subsystem. Firewall technologies, their functions and capabilities. Firewall connection schemes Basics of virtual private network (VPN) technology. Concept of construction, classification. VPN security tools VPN administration. Protection at the channel, network and session level. IP8es, implementation features, application schemes. Data protection infrastructure at the application level Identity and access management. The Keguide system. Intrusion detection technologies. Tools for analysing network security. Tools for detecting attacks, their classification. Methods of response Problems of antivirus protection Classification of viruses. The main ways of spreading. Methods of virus detection Methods of managing network security tools. Local and global security agent. Audit and monitoring
Assessment methods and criteria: Current control: laboratory experiments and their defence Final control: exam The distribution of points according to a 100-point scale: Current control (CC)-30 points, including: Classroom work (Laboratory experiments and reports) -20 points; Self-study (Preparing and defence of laboratory works) – 10 points; Exam -70 points, including: Written test -55 points; Oral -15 points
Критерії оцінювання результатів навчання: ECTS
Recommended books: 1. Андрончик А.Н. и др. Защита информации в компьютерньїх системах. - Екатиринбург:УГТУ-УПИ, 2008 2. Торокин А.А. Инженерно-техническая защита информации -Москва:Гелиос АРВ,2005- 960 с. 3. Скляров Д. Исскуство защиты и взлома информации. -С-Петербург:БХВ,2007-288 с.