Home/ Majors directory/Distributed Information Systems and Technologies/Information Protection Technologies
Information Protection Technologies
Major: Distributed Information Systems and Technologies
Code of subject: 6.126.03.E.052
Credits: 4.00
Department: Information Systems and Networks
Lecturer: Ph.D., Associate Professor Basyuk Taras Mykhailovych
Semester: 7 семестр
Mode of study: денна
Завдання: The study of an academic discipline involves the formation and development of students' competencies:
integral: The ability to solve complex specialized tasks and practical problems in the field of information systems and technologies, or in the learning process, characterized by the complexity and uncertainty of conditions that require the application of theories and methods of information technologies.
professional:
FCS 1.4. The ability to develop conceptual and mathematical models of information systems and technologies, smart systems, perform their parameterization and verify the requirements of the technical task.
Learning outcomes: PRN 1.9. To use the knowledge of implementing methods and technologies of cryptographic data protection in the development and operation of intelligent information systems.
KOM 1. Ability to communicate, including oral and written communication in Ukrainian and foreign (English) languages;
KOM 2. Ability to use various methods of modern information technologies for effective communication at the professional and social levels.
AiB1. Ability to adapt to new situations and make appropriate decisions;
AiB2. The ability to realize the need for lifelong learning in order to deepen the acquired and acquire new professional knowledge;
AiB3. The ability to take responsibility for the work performed, to make decisions independently, to achieve the set goal in compliance with the requirements of professional ethics.
Required prior and related subjects: Cloud technologies
IT project management
Summary of the subject: In the process of studying this discipline, the main ways and methods used to protect information in computer systems and networks are studied. The theoretical foundations and concepts of the organization of information security of computer systems are taught; basic standards for legal aspects in the field of information protection are considered and software protection methods are described; the main schemes of password, hardware and biometric authentication are investigated and the features of information protection in the process of electronic payments are given.
Опис: Information security of computer systems
Concepts of information security
Standardization in the field of information protection
User identification and authentication
Software protection methods
Biometric methods of authentication
Network security and virtual private networks
Management of cryptographic keys
Protection of information in electronic payment systems
Assessment methods and criteria: Knowledge diagnostics is carried out by evaluating the completed laboratory work, control calculation work and examination control (written and oral component) in the form of test questions.
Критерії оцінювання результатів навчання: • Current control (40%): written reports on laboratory work, oral examination;
• Final control (60% of exam): in written, verbally.
Порядок та критерії виставляння балів та оцінок: 100–88 points – (“excellent”) is awarded for a high level of knowledge (some inaccuracies are allowed) of the educational material of the component contained in the main and additional recommended literary sources, the ability to analyze the phenomena being studied in their interrelationship and development, clearly, succinctly, logically, consistently answer the questions, the ability to apply theoretical provisions when solving practical problems; 87–71 points – (“good”) is awarded for a generally correct understanding of the educational material of the component, including calculations, reasoned answers to the questions posed, which, however, contain certain (insignificant) shortcomings, for the ability to apply theoretical provisions when solving practical tasks; 70 – 50 points – (“satisfactory”) awarded for weak knowledge of the component’s educational material, inaccurate or poorly reasoned answers, with a violation of the sequence of presentation, for weak application of theoretical provisions when solving practical problems; 49-26 points - ("not certified" with the possibility of retaking the semester control) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to apply theoretical provisions when solving practical problems; 25-00 points - ("unsatisfactory" with mandatory re-study) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to navigate when solving practical problems, ignorance of the main fundamental provisions.
Recommended books: 1. Ostapov S.E. Information protection technologies / S.E. Ostapov, S.P. Yevseev, O.G. Korol - Lviv: Rodovid, 2014. - 428p.
2. Kohut Y.I. Digital transformation of the economy and problems of cyber security / Y.I. Kogut - K.: SIDCON, 2021. - 368p.
3. Khoroshko V.O. Designing complex information protection systems/ V.O. Khoroshko - Lviv: Publishing House of Lviv Polytechnic, 2020. - 317p.
4. Bogush V.M. Information security: terminological study guide / V.M. Bogush, V.G. Kryvutsa, A.M. Kudin - K.: D.V.K., 2010. - 508 p.
5. DSTU 3396.2-97. Protection of information. Technical protection of information. Terms and definitions. - Enter 01.01.98. - K.: Derzhstandard of Ukraine, 1997. - 11 p.
6. Watermelon S.V. Basics of information security / S. V. Kavun, O. A. Smirnov, V. F. Stolbov – Kirovohrad: Ed. KNTU, 2012. – 414 p.
7. Kuznetsov O. O. Protection of information in information systems / O. O. Kuznetsov, S. P. Yevseev, O. G. Korol. – Kh.: Ed. Khneu, 2011. – 512 p.
8. Kohut Y.I. Corporate security. Practical guide/ Yu.I. Kogut - K.: SIDCON, 2021. - 460 p.
9. Ostapov S.E. Cyber security: modern protection technologies / S.E. Ostapov, S.P. Yevseev, O.G. Korol - Lviv: Novy Svit-2000, 2020. - 676 p.
10. Karachka A.F. Information protection technologies [Electronic resource] - Access mode: http://dspace.tneu.edu.ua/retrieve/52646/lekzii.pdf
11. State Service of Special Communications and Information Protection of Ukraine. Legal framework [Electronic resource] - Access mode: http://195.78.68.84/dsszzi/control/uk/publish/ article;jsessionid=E04F752BB674B68DF9C37DB6846E694E.app1?art_id=88291&cat_id=38828
12. Tarnavskyi Yu.A. Information protection technologies [Electronic resource] - Access mode: http://ela.kpi.ua/bitstream/123456789/23896/1/TZI_book.pdf
Уніфікований додаток: Lviv Polytechnic National University ensures the realization of the right of persons with disabilities to obtain higher education. Inclusive educational services are provided by the Service of accessibility to learning opportunities "Without restrictions", the purpose of which is to provide permanent individual support for the educational process of students with disabilities and chronic diseases. An important tool for the implementation of the inclusive educational policy at the University is the Program for improving the qualifications of scientific and pedagogical workers and educational and support staff in the field of social inclusion and inclusive education. Contact at:
St. Karpinsky, 2/4, 1st floor, room 112
E-mail: nolimits@lpnu.ua
Websites: https://lpnu.ua/nolimits https://lpnu.ua/integration
Академічна доброчесність: The policy regarding the academic integrity of the participants of the educational process is formed on the basis of compliance with the principles of academic integrity, taking into account the norms "Regulations on academic integrity at the Lviv Polytechnic National University" (approved by the academic council of the university on June 20, 2017, protocol No. 35).