Home/ Majors directory/Information Systems and Technologies/Security in Distributed Information Systems
Security in Distributed Information Systems
Major: Information Systems and Technologies
Code of subject: 7.126.01.O.008
Credits: 5.00
Department: Information Systems and Networks
Lecturer: PhD, Associate Professor Kravets Petro
Semester: 2 семестр
Mode of study: денна
Завдання: The study of an educational discipline involves the formation of competencies in students of education:
Integral:
The ability to solve complex specialized tasks and practical problems in the field of ICT during the implementation of professional activities or in the learning process, which involves conducting research and/or implementing innovations, and is characterized by the uncertainty of conditions and requirements.
General competences:
K01. Ability to apply analytical and critical thinking skills to solve ICT problems, including in the face of incomplete/insufficient information and conflicting requirements.
K05. Ability to evaluate and ensure the quality of performed works in the field of ICT.
Professional competences:
K08. The ability to identify ICTs that are of strategic importance to organizations or enterprises and can be applied to solve existing, new or potential problems of enterprises, institutions and organizations, as well as manage the implementation of these technologies.
K10. The ability to design corporate information systems taking into account the features of business architecture, information architecture, application systems, technological architecture to combine and synchronize the functional and business needs of the organization with the capabilities of information technologies in conditions of increased complexity, incomplete / insufficient information and conflicting requirements.
K14. Ability to manage information risks of the organization based on the concept of information security using database security systems, network security and cryptographic data protection.
Learning outcomes: As a result of studying the academic discipline, the student must:
• Know the scientific principles of security of distributed information systems.
• To know the current state of affairs and the latest technologies in the field of security of distributed information systems.
• Be able to use in-depth theoretical and fundamental knowledge, abilities and skills in the security of distributed information systems to successfully solve complex specialized tasks and practical problems during professional activities in the field of information systems and technologies or in the learning process, which involves the application of theories and methods of the relevant educational discipline and is characterized by complexity and uncertainty of conditions.
• Be able to form theoretical and practical solutions for designing and supporting information protection systems.
• Be able to apply knowledge and practical skills of analysis of relevant regulatory documents, current standards and technical conditions in the industry
Required prior and related subjects: • Information protection technologies
• Information systems design technologies
• Data and knowledge engineering
• Distributed information systems
• Information technologies of computer networks
• Information resource integration technologies
Summary of the subject: This discipline studies the architecture and components of information protection systems, methods, tools and protocols of information security according to international and corporate standards for the protection of distributed information systems. The main attention is paid to cryptographic methods of information protection, authentication and process identification in distributed information systems and electronic digital signature systems.
The knowledge gained in the course of studying the discipline is based on the key provisions of informatics, information technologies, computer design technologies, modern methods and tools of security and management of distributed systems.
Опис: 1. Architecture and components of information protection systems. Objects of protection of distributed information systems. The main sources of danger for distributed information systems.
2. International and corporate standards for the protection of distributed information systems
3. Methods and means of information security in distributed information systems.
4. Cryptographic methods of information protection. Classical cryptographic systems.
5. Mathematical foundations of cryptographic protection of information.
6. Modern symmetric cryptosystems. Block and stream encryption.
7. Cryptographic methods of information protection. Asymmetric cryptosystems.
8. Authentication and identification of objects and subjects of the distributed information system. Cryptographic protocols.
9. Electronic digital signature systems.
10. Network and information security. Impact of network type and architecture on information security. Overview of the security of data exchange protocols.
11. Security of data transmission channels. Virtual networks. Network screens.
12. Security of commercial transactions on the Internet.
13. Security of operating systems.
14. Information-theoretical stability of ciphers. Methods and means of cryptanalysis.
Assessment methods and criteria: Diagnostics of knowledge is carried out by evaluating the completed laboratory work, examination control work in the form of test questions of three levels of difficulty, and coursework.
Evaluation of laboratory work consists of an oral survey and a test of the performance of computer programs.
Examination control consists in the performance of written control work in the form of tests. The number of test tasks is about 30. Tests cover all sections of the academic discipline. In the case of multiple-choice answers to the test task, the evaluation is carried out according to the "all or nothing" rule.
The assessment of the coursework takes into account the current control of the execution of the work, the correspondence of the content of the work to the given topic, the completeness of the presentation of the material, the efficiency and originality of the developed programs, the protection of the work and answers to control questions, the quality of the work design, compliance with methodological guidelines and industry standards.
Критерії оцінювання результатів навчання: • Current control (30%): written reports on laboratory work, oral survey
• Final (examination) control (60%): written component - 60%, oral component - 10%.
Порядок та критерії виставляння балів та оцінок: 100–88 points – (“excellent”) is awarded for a high level of knowledge (some inaccuracies are allowed) of the educational material of the component contained in the main and additional recommended literary sources, the ability to analyze the phenomena being studied in their interrelationship and development, clearly, succinctly, logically, consistently answer the questions, the ability to apply theoretical provisions when solving practical problems;
87–71 points – (“good”) is awarded for a generally correct understanding of the educational material of the component, including calculations, reasoned answers to the questions posed, which, however, contain certain (insignificant) shortcomings, for the ability to apply theoretical provisions when solving practical tasks;
70 – 50 points – (“satisfactory”) awarded for weak knowledge of the component’s educational material, inaccurate or poorly reasoned answers, with a violation of the sequence of presentation, for weak application of theoretical provisions when solving practical problems;
49-26 points - ("not certified" with the possibility of retaking the semester control) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to apply theoretical provisions when solving practical problems;
25-00 points - ("unsatisfactory" with mandatory re-study) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to navigate when solving practical problems, ignorance of the main fundamental provisions.
Recommended books: 1. Інформаційна безпека. Навчальний посібник / Ю.Я. Бобало, І.В. Горбатий, М.Д. Кіселичник, А.П. Бондарєв, С.С. Войтусік, А.Я. Горпенюк, О.А. Нємкова, І.М. Журавель, Б.М. Березюк, Є.І. Яковенко, В.І. Отенко, І.Я. Тишик. – Львів: Видавництво Львівської політехніки, 2019. – 580 с.
2. Кавун С. В. Інформаційна безпека. Навчальний посібник Ч. 1 / С. В. Кавун, В. В. Носов, О. В. Манжай. – Харків: Вид. ХНЕУ, 2007. – 352 с.
3. Кавун С. В. Інформаційна безпека. Навчальний посібник. Ч. 2 / С. В. Кавун, В.В. Носов, О. В. Манжай. – Харків: Вид. ХНЕУ, 2008. – 196 с.
4. Лужецький В.А. Основи інформаційної безпеки: навчальний посібник / В.А. Лужецький, А.Д. Кожухівський, О.П. Войтович. – Вінниця: ВНТУ, 2013. – 221 с.
5. Гайворонський М.В. Безпека інформаційно-комунікаційних систем. – К.: Видавнича група BHV, 2009. – 608 с.
6. Ковтунець В.В. Безпека систем підтримки прийняття рішень: навч. посібник / В.В. Ковтунець, О.В. Нестеренко, О.І. Савенков. – К.: Національна академія управління, 2016. – 190 с.
7. Технології захисту інформації [Електронний ресурс] : підручник / Ю. А. Тарнавський; КПІ ім. Ігоря Сікорського. – Електронні текстові дані (1 файл: 2,04 Мбайт). – Київ : КПІ ім. Ігоря Сікорського, 2018. – 162 с.
8. Остапов С. Е. Технології захисту інформації: навчальний посібник / С. Е. Остапов, С. П. Євсеєв, О. Г. Король. – Х. : Вид. ХНЕУ, 2013. – 476 с.
9. Stallings W. Cryptography and Network Security: Principles and Practice / W. Stallings. – 6th Edition. – Pearson, 2013. – 752 с.
10. Schneier B. Applied Cryptography: Protocols, Algorithms, and Code in C / B. Schneier. – Wiley, 2017. – 1588 p.
Уніфікований додаток: Lviv Polytechnic National University ensures the realization of the right of persons with disabilities to obtain higher education. Inclusive educational services are provided by the Service of accessibility to learning opportunities "Without restrictions", the purpose of which is to provide permanent individual support for the educational process of students with disabilities and chronic diseases. An important tool for the implementation of the inclusive educational policy at the University is the Program for improving the qualifications of scientific and pedagogical workers and educational and support staff in the field of social inclusion and inclusive education. Contact at:
St. Karpinsky, 2/4, 1st floor, room 112
E-mail: nolimits@lpnu.ua
Websites: https://lpnu.ua/nolimits https://lpnu.ua/integration
Академічна доброчесність: The policy regarding the academic integrity of the participants of the educational process is formed on the basis of compliance with the principles of academic integrity, taking into account the norms "Regulations on academic integrity at the Lviv Polytechnic National University" (approved by the academic council of the university on June 20, 2017, protocol No. 35).
Security in Distributed Information Systems (курсова робота)
Major: Information Systems and Technologies
Code of subject: 7.126.01.O.009
Credits: 2.00
Department: Information Systems and Networks
Lecturer: Ph.d., Associate Professor. Kis Yaroslav P.
Semester: 2 семестр
Mode of study: денна
Learning outcomes: • know the basic technology of distributed information systems, methods of maintaining security in distributed environments, and administration tools in distributed information systems.
• ability to analyze, design, administration and operation, and technology support security in distributed information systems.
Required prior and related subjects: • System analysis
• Operating Systems
• Object-Oriented Programming
• Organization of data and knowledge.
• Cryptography
Summary of the subject: Subject and objectives of discipline. Architecture and components of information security systems. Objects protect distributed information systems. The main source of danger for distributed information systems. International and corporate standards. Audentyfikatsiya and identification of objects and distributed information systems. Protecting distributed information systems. Network and information security. Review of safety data exchange protocols. Security external data feeds. Virtual networks. Network screens. Security of commercial transactions on the Internet.
Assessment methods and criteria: • Current control (40%): written reports on laboratory work, essay, oral examination;
• Final control (60% of exam): in written, verbally.
Recommended books: 1. Уэйнгроу. Администрирование и защита. UNIX: полезные советы для системного администратора. ДМК. 2003.
2. Бурдаев. Ассемблер в задачах защиты информации. КУДИЦ-ОБРАЗ. 2002.
3. Бэндл. Защита и безопасность в сетях Linux. Для профессионалов. Питер. 2002.
4. Козлов. Теория и практика борьбы с компьютерной преступностью. Радио и связь. 2002.
5. Девянин. Теоретические основы компьютерной безопасности. Уч. пособие для ВУЗов. Радио и связь. 2002.