Complex Information Security Systems (курсовий проєкт)

Major: Cybersecurity
Code of subject: 6.125.00.O.105
Credits: 3.00
Department: Information Security
Lecturer: Professor Liubomyr Parkhuts
Semester: 8 семестр
Mode of study: денна
Learning outcomes: - Implement comprehensive information security systems in automated systems (AS) of the organization (enterprise) in accordance with the requirements of regulatory documents. - Apply theories and methods of protection to ensure the security of information in information and telecommunications systems. - Implement measures to combat unauthorized access to information resources and processes in information and information and telecommunications (automated) systems. - Apply theories and methods of protection to ensure the security of elements of information and telecommunications systems. - Participate in the development and implementation of information security and / or cybersecurity strategies in accordance with the goals and objectives of the organization. - Detect dangerous signals of technical means.
Required prior and related subjects: - Fundamentals of information and cybersecurity - Methods and means of information protection - Systems of technical protection of information - Computer networks - Information security audit
Summary of the subject: The discipline "Integrated information protection systems" in the system of training specialists of the educational and qualification level of bachelor is a general technical course. The subject of the discipline is: the study of modern methods of designing information security systems; a set of basic theoretical principles for creating information security systems; processes for ensuring the required level of information security; features of design technologies and information security at facilities. The issues of licensing activities in the field of information protection, certification of information security tools, as well as certification of computer science facilities and information security organization at TZPI facilities are considered.
Assessment methods and criteria: - oral examination in practical classes, control work (30%); - final control (control measure, written-oral exam) (70%).
Recommended books: 1.DSTU 3396.0-96. Information protection. Technical protection of information. Substantive provisions. 2.DSTU 3396.1-96. Information protection. Technical protection of information. The order of works. 3.ND TZI 1.1.-002-99. General provisions for the protection of information in computer systems from unauthorized access. 4.ND TZI 2.5.-004-99. Criteria for assessing the security of information in computer systems from unauthorized access. 5.ND TZI 2.5.-005-99. Classification of automated systems and standard functional profiles of protection of processed information from unauthorized access. 6.ND TZI 3.7.-001-99. Methodical instructions on development of the technical task on creation of system of protection of the information in the automated system. 7. The order of carrying out works on certification of means of maintenance of technical protection of the information of general purpose. 8. Temporary provision on categorization of objects (TPKO - 95). 9.ND TZI 2.7.- 001-99. Technical protection of information on software-controlled public PBX. The order of performance of works. 10.ND TZI 3.6.-001-2000. Technical protection of information. Computer systems. Procedure for creation, implementation, maintenance and modernization of means of mechanical protection of information from unauthorized access. 11.ND TZI 3.7.- 002-99. Technical protection of information on software-controlled public PBX. Method of assessing the security of information (basic). 12.ND TZI 4.7.- 002-2001. Determination of protection of speech information from leakage by acoustic and vibroacoustic channels. Methodical instructions.

Complex Information Security Systems (курсовий проєкт)

Major: Cybersecurity
Code of subject: 6.125.00.O.104
Credits: 3.00
Department: Information Technology Security
Lecturer: Associate Professor, Candidate of Technical Sciences Yuriy Kostiv
Semester: 8 семестр
Mode of study: денна
Learning outcomes: General description of the tasks of modeling complex information security system. Formal security model and analysis. Applied models of information security in automated systems. Formal construction of model protection. Formalizing security model. Ymovirnostnyy approach. Evaluation approach. The experimental approach. Economic approach.
Required prior and related subjects: prerequisites: - Information and communication systems; - Cryptographic systems and protocols; - The architecture of computer systems.
Summary of the subject: Course project on discipline is carried out in order to consolidate and deepen the theoretical knowledge and skills acquired by the students in the process of mastering all course training material in the research and development of complex information security systems. The specific objective of the course project is contained in the development of a comprehensive information security system for the automated system caused by derived data option for individual tasks.
Assessment methods and criteria: The final score is assigned based on the results of this monitoring a 100-point scale.
Recommended books: 1. ID Gorbenko, TO Grinenko. Information security in information and telecommunication systems: manual. guide, Part 1, cryptographic protection. - Kharkov: KNURE, 2004. - 368 p. 2. AK Yudin, V. Bogush Information security state. - K .: "MK-Press", 2005. - 432 p. 3. AV Dudatyev Informational security. Tutorial. - Vinnitsa: UNIVAR-Sumy, Vinnytsia, 2009. - 240 p.

Complex Information Security Systems

Major: Cybersecurity
Code of subject: 6.125.00.O.101
Credits: 4.00
Department: Information Security
Lecturer: Professor Liubomyr Parkhuts
Semester: 8 семестр
Mode of study: денна
Learning outcomes: - Implement comprehensive information security systems in automated systems (AS) of the organization (enterprise) in accordance with the requirements of regulatory documents. - Apply theories and methods of protection to ensure the security of information in information and telecommunications systems. - Implement measures to combat unauthorized access to information resources and processes in information and information and telecommunications (automated) systems. - Apply theories and methods of protection to ensure the security of elements of information and telecommunications systems. - Participate in the development and implementation of information security and / or cybersecurity strategies in accordance with the goals and objectives of the organization. - Detect dangerous signals of technical means.
Required prior and related subjects: - Fundamentals of information and cybersecurity - Methods and means of information protection - Systems of technical protection of information - Computer networks - Information security audit
Summary of the subject: The discipline "Integrated information protection systems" in the system of training specialists of the educational and qualification level of bachelor is a general technical course. The subject of the discipline is: the study of modern methods of designing information security systems; a set of basic theoretical principles for creating information security systems; processes for ensuring the required level of information security; features of design technologies and information security at facilities. The issues of licensing activities in the field of information protection, certification of information security tools, as well as certification of computer science facilities and information security organization at TZPI facilities are considered.
Assessment methods and criteria: - oral examination in practical classes, control work (30%); - final control (control measure, written-oral exam) (70%).
Recommended books: 1.DSTU 3396.0-96. Information protection. Technical protection of information. Substantive provisions. 2.DSTU 3396.1-96. Information protection. Technical protection of information. The order of works. 3.ND TZI 1.1.-002-99. General provisions for the protection of information in computer systems from unauthorized access. 4.ND TZI 2.5.-004-99. Criteria for assessing the security of information in computer systems from unauthorized access. 5.ND TZI 2.5.-005-99. Classification of automated systems and standard functional profiles of protection of processed information from unauthorized access. 6.ND TZI 3.7.-001-99. Methodical instructions on development of the technical task on creation of system of protection of the information in the automated system. 7. The order of carrying out works on certification of means of maintenance of technical protection of the information of general purpose. 8. Temporary provision on categorization of objects (TPKO - 95). 9.ND TZI 2.7.- 001-99. Technical protection of information on software-controlled public PBX. The order of performance of works. 10.ND TZI 3.6.-001-2000. Technical protection of information. Computer systems. Procedure for creation, implementation, maintenance and modernization of means of mechanical protection of information from unauthorized access. 11.ND TZI 3.7.- 002-99. Technical protection of information on software-controlled public PBX. Method of assessing the security of information (basic). 12.ND TZI 4.7.- 002-2001. Determination of protection of speech information from leakage by acoustic and vibroacoustic channels. Methodical instructions.

Complex Information Security Systems

Major: Cybersecurity
Code of subject: 6.125.00.O.100
Credits: 4.00
Department: Information Technology Security
Lecturer: Associate Professor, Candidate of Technical Sciences Yuriy Kostiv
Semester: 8 семестр
Mode of study: денна
Learning outcomes: - Technological and organizational building integrated system information security; - Potential channels and methods of unauthorized access information; - Methods and data protection; - The content of the work of the organization and the main stages of the complex information security systems.
Required prior and related subjects: prerequisites: - Information and communication systems; - Cryptographic systems and protocols; - The architecture of computer systems.
Summary of the subject: The goals, objectives and principles of the integrated system information security. Security management company. The international standards. Aims and objectives of information security in automated systems. Current understanding of the methodology informatsiyi.Metodolohichni protect the foundations of a comprehensive information security system. Policy development security. Information security management system. Requirements for organizational and technical component of a comprehensive information security system. Stages of development of complex systems information security.
Assessment methods and criteria: The final score is assigned based on the results of this monitoring a 100-point scale.
Recommended books: 1. ID Gorbenko, TO Grinenko. Information security in information and telecommunication systems: manual. guide, Part 1, cryptographic protection. - Kharkov: KNURE, 2004. - 368 p. 2. AK Yudin, V. Bogush Information security state. - K .: "MK-Press", 2005. - 432 p. 3. AV Dudatyev Informational security. Tutorial. - Vinnitsa: UNIVAR-Sumy, Vinnytsia, 2009. - 240 p.