Bank Security Systems

Major: Cybersecurity
Code of subject: 6.125.01.E.076
Credits: 4.00
Department: Information Technology Security
Lecturer: assistant professor Serhiy Semenyuk
Semester: 6 семестр
Mode of study: денна
Мета вивчення дисципліни: The purpose of learning the discipline is to study the basics of information protection systems in banking systems, protection of transactions in payment systems, distribution of keys for banking and corporate networks, study of methods and protocols for ensuring security in electronic commerce.
Завдання: The study of an educational discipline involves the formation of competencies in students of education: INT The ability to solve complex specialized tasks and practical problems during professional activity in the field of information security and/or cyber security, which is characterized by complexity and incomplete determination of conditions. General: ZK 1. Ability to apply knowledge in practical situations. ZK 2. Knowledge and understanding of the subject area and understanding of the profession. ZK 3. The ability to communicate professionally in national and foreign languages both orally and in writing. ZK 4. The ability to identify, pose and solve problems in a professional direction. ZK 5. Ability to search, process and analyze information. Specialty: FC 1. Ability to apply the legislative and regulatory framework, as well as state and international requirements, practices and standards in order to carry out professional activities in the field of information and cyber security. FC 2. Ability to use information and communication technologies, modern methods and models of information security and/or cyber security. FC 3. Ability to use software and software-hardware complexes of information protection means in information and telecommunication systems. FC 4. Ability to ensure business continuity in accordance with established information and/or cyber security policies. FC 5. The ability to ensure the protection of information processed in information and telecommunication systems for the purpose of implementing the established information and/or cyber security policy. FC 6. The ability to restore the normal functioning of information, information and telecommunication systems after the implementation of threats, cyber attacks, failures and failures of various classes and origins. FC 7. The ability to implement and ensure the functioning of complex information protection systems (complexes of regulatory, legal, organizational and technical means and methods, procedures, practical techniques, etc.) FC 8. Ability to carry out incident management procedures, conduct investigations, provide them with an assessment. FC 9. Ability to perform professional activities based on the implemented information and/or cyber security management system. FC 10. Ability to apply methods and means of cryptographic and technical protection of information at objects of information activity. FC 11. Ability to monitor the processes of functioning of information. information and telecommunication systems in accordance with the established policy of information and/or cyber security. FC 12. Ability to analyze, identify and evaluate possible threats, vulnerabilities and destabilizing factors to the information space and information resources in accordance with the established policy of information and/or cyber security. Professional direction: FCS 1.1. Knowledge of basic approaches to the organization of typical complexes and means of information protection in information and communication systems. FCS 1.2. Knowledge of new domestic and international information security standards. FCS 1.3. Knowledge of the main models of vulnerabilities, threats and attacks to substantiate options for building an automated information security monitoring system for information and communication systems and its main components. FCS 1.4. Knowledge of technologies for creating protection systems for computer systems and networks for the development and definition of general principles for the construction of protection systems, tasks and initial data that must be taken into account when designing protection systems. FCS 1.6. Knowledge and ability to effectively assess the risks of penetration into information and communication systems, taking into account all potential threats. FCS 1.7. Knowledge of modern approaches to identification, authentication, authorization of processes and users in information and communication systems.
Learning outcomes: ZN 20. Knowledge of basic approaches to the organization of standard complexes and means of information protection in information and communication systems. ZN 21. Knowledge of new domestic and international standards of information security. ZN 22. Knowledge of basic models of vulnerabilities, threats and attacks to justify options for building an automated information security monitoring system for information and communication systems and its main components ZN 1.6. Solve problems of protection of information processed in information and telecommunication systems using modern methods and means of cryptographic protection of information. ZN 1.7. Use the implementation and support of intrusion detection systems and use cryptographic protection components to ensure the required level of information security in information and telecommunications systems. ZN 1.8. Ensure the proper functioning of monitoring systems for information resources and processes in information and telecommunications systems. ZN 1.9. Ensure the functioning of software and software and hardware systems for detecting intrusions of different levels and classes (statistical, signature, statistical-signature). ZN 1.10. Maintain performance and provide 12 configuration of intrusion detection systems in information and telecommunications systems. ZN 1.11. Use tools to monitor processes in information and telecommunications systems.
Required prior and related subjects: • Work in the Internet. • Computer networks. • Network operating system.
Summary of the subject: The scope of the discipline includes methods and means of protecting information in banking systems, methods of cryptographic transformations of information, and methods of their implementation, in particular symmetric and asymmetric cryptography algorithms used in electronic payment systems of the National Bank of Ukraine. Also considered methods and means of protecting banking information. This includes a presentation of the general basics of using cryptographic algorithms in banking information protection systems
Опис: Justice description of banking security threats. NBU EPS. Security NBU electronic payment system. S.W.I.F.T. and its safety. The system is legal providing banking security. The security measures of the bank. Information-analytical work of the legal provision of banking security. Legal and physical protection of credit and foreign exchange transactions of banks. Protection of bank operations with securities. Prevention and crime prevention banking.
Assessment methods and criteria: Current control of classes is carried out with the aim of clarifying the circumstances of the educational process, determining its results in the following forms: • preliminary detection of students' knowledge level before classes begin; • current check in the process of assimilation of each topic being studied; • evaluation of the student's activity in the course of lectures; • assessment of the student's activity in the process of practical classes; • verification of practical works; • checking of control work; • an oral survey of the knowledge gained in the process of performing laboratory work; • verification of the implementation of the course project; Final (examination) control is carried out based on the results of test control and oral survey.
Критерії оцінювання результатів навчання: • practical classes - 40% • examination control, written form - 50% • examination control, oral form - 10%
Порядок та критерії виставляння балів та оцінок: 100–88 points – (“excellent”) is awarded for a high level of knowledge (some inaccuracies are allowed) of the educational material of the component contained in the main and additional recommended literary sources, the ability to analyze the phenomena being studied in their interrelationship and development, clearly, succinctly, logically, consistently answer the questions, the ability to apply theoretical provisions when solving practical problems; 87–71 points – (“good”) is awarded for a generally correct understanding of the educational material of the component, including calculations, reasoned answers to the questions posed, which, however, contain certain (insignificant) shortcomings, for the ability to apply theoretical provisions when solving practical tasks; 70 – 50 points – (“satisfactory”) awarded for weak knowledge of the component’s educational material, inaccurate or poorly reasoned answers, with a violation of the sequence of presentation, for weak application of theoretical provisions when solving practical problems; 49-26 points - ("not certified" with the possibility of retaking the semester control) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to apply theoretical provisions when solving practical problems; 25-00 points - ("unsatisfactory" with mandatory re-study) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to navigate when solving practical problems, ignorance of the main fundamental provisions.
Recommended books: 1. В.К.Задірака, О.С. Олексюк, М.О.Недашковський Методи захисту банківської інформації: Навчальний посібник /– К.: Вища шк., 1999, - 261 с. 2. В.М.Ахрамович Курс лекцій з з навчальної дисципліни "Кібербезпека банківських та комерційних структур" /– К.:ДУТ, 2019. – 163 с. 3. КорченкоА.О., Скачек Л.М, Хорошко В.О. Банківська безпека: Підручник /– К.: ПВП «Задруга», 2014 – с.185. 4. Тардаскіна Т.М., Стрельчук Є.М., Терешко Ю.В. Електронна комерція: Навчальний посібник /– Одеса: ОНАЗ ім. О.С. Попова, 2011. – 244 с.
Уніфікований додаток: Lviv Polytechnic National University ensures the realization of the right of persons with disabilities to obtain higher education. Inclusive educational services are provided by the Service of accessibility to learning opportunities "Without restrictions", the purpose of which is to provide permanent individual support for the educational process of students with disabilities and chronic diseases. An important tool for the implementation of the inclusive educational policy at the University is the Program for improving the qualifications of scientific and pedagogical workers and educational and support staff in the field of social inclusion and inclusive education. Contact at: St. Karpinsky, 2/4, 1st floor, room 112 E-mail: nolimits@lpnu.ua Websites: https://lpnu.ua/nolimits https://lpnu.ua/integration
Академічна доброчесність: The policy regarding the academic integrity of the participants of the educational process is formed on the basis of compliance with the principles of academic integrity, taking into account the norms "Regulations on academic integrity at the Lviv Polytechnic National University" (approved by the academic council of the university on June 20, 2017, protocol No. 35).