Tools for Software Description of Cybersecurity Hardware Tools (курсовий проєкт)

Major: Management of Information Security
Code of subject: 7.125.03.E.020
Credits: 3.00
Department: Information Security
Lecturer: Ph.D., Associate Professor Horpenyuk A.Y.
Semester: 2 семестр
Mode of study: денна
Мета вивчення дисципліни: The purpose of teaching the discipline is to provide students with thorough knowledge of the theory and practice of analysis and design of electronic devices in the VERILOGHDL language, which is the basis for conducting research work, performing analysis of the obtained results, and assessing the accuracy of the developed model.
Завдання: general competences: GC1. Ability to apply knowledge in practical situations. GC4. The ability to evaluate and ensure the quality of the work performed. professional competences of the specialty: PC9. The ability to analyze, develop and support the system of auditing and monitoring the effectiveness of the functioning of information systems and technologies, business/operational processes in the field of information security and/or cyber security of the organization as a whole. professional competences of a professional direction: PCD 6. Ability to work with information security incidents, perform their evaluation, determine priorities and analyze incidents.
Learning outcomes: Learning outcomes: LO9. Analyze, develop and support the organization's information security and/or cyber security management system based on the information security strategy and policy. LO16. Make informed decisions on organizational and technical issues of information security and/or cyber security in complex and unpredictable conditions, including using modern methods and means of optimization, forecasting and decision-making. LO23. To justify the choice of software, equipment and tools, engineering technologies and processes, as well as their limitations in the field of information security and/or cyber security based on current knowledge in related fields, scientific, technical and reference literature and other available information: Teaching and learning methods: Independent work - research method. Methods of evaluating the achievement of learning outcomes: Current verification in the course project implementation process. An oral survey on the assimilation of knowledge acquired in the process of independent performance of course design tasks.
Required prior and related subjects: • Schematic engineering, • Cryptographic systems and protocols, • Fundamentals of scientific research and organization of science, • Design of SHI.
Summary of the subject: This discipline provides students with the necessary knowledge for effective analysis and design of electronic cyber security tools, automated development and research of electronic digital cyber security devices. The tools of the high-level electronic device description language VERILOGHDL are studied and used for the design of a given device.
Опис: Course project Goal: • consolidation and deepening of theoretical knowledge of the discipline; • gaining experience in the analysis and design of electronic devices in the VERILOGHDL language; • gaining experience in the use of CAD for the analysis and design of electronic devices in the VERILOGHDL language. Content: • technical task for the development of a cryptographic protection subsystem in the VERILOGHDL language; • development and debugging of the VERILOGHDL model of the cryptographic protection subsystem. Estimated volume of the explanatory note: 30-50 pages. The required time to complete the work is 90 hours. Consultations are conducted in accordance with the given course design content. The form of control is differentiated assessment.
Assessment methods and criteria: Assessment of the level of achievement of learning outcomes is carried out in the following forms: • identifying the level of students' knowledge in the course design process; • verification of course design tasks; • identifying the level of theoretical knowledge and practical skills in the course project defense process; The final control is carried out based on the results of the defense of the course project before the commission.
Критерії оцінювання результатів навчання: Verification of course design tasks: 50 points. Defense of the course project: 50 points. Total for the discipline: 100 points.
Порядок та критерії виставляння балів та оцінок: 100–88 points – (“excellent”) is awarded for a high level of knowledge (some inaccuracies are allowed) of the educational material of the component contained in the main and additional recommended literary sources, the ability to analyze the phenomena being studied in their interrelationship and development, clearly, succinctly, logically, consistently answer the questions, the ability to apply theoretical provisions when solving practical problems; 87–71 points – (“good”) is awarded for a generally correct understanding of the educational material of the component, including calculations, reasoned answers to the questions posed, which, however, contain certain (insignificant) shortcomings, for the ability to apply theoretical provisions when solving practical tasks; 70 – 50 points – (“satisfactory”) awarded for weak knowledge of the component’s educational material, inaccurate or poorly reasoned answers, with a violation of the sequence of presentation, for weak application of theoretical provisions when solving practical problems; 49-26 points - ("not certified" with the possibility of retaking the semester control) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to apply theoretical provisions when solving practical problems; 25-00 points - ("unsatisfactory" with mandatory re-study) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to navigate when solving practical problems, ignorance of the main fundamental provisions.
Recommended books: Educational and methodological support: 1. Горпенюк А.Я. Електронний навчально-методичний комплекс «Комп’ютерні методи високорівневого проектування пристроїв захисту» у Віртуальному середовищі Львівської політехніки. 2. Хомич С.В. Курс лекцій з дисципліни “Мови опису апаратних засобів”. 3. Горпенюк А.Я., Зеляновський Ю.Є. Навчальний посібник для проектування мовою VERILOG ПЛІС Altera (FPGA) у середовищі Quartus® II. Recommended Books: Basic: 1. Бобало Ю.Я. Інформаційна безпека: навч. посібник / Ю.Я.Бобало, І.В.Горбатий, М.Д.Кіселичник, А.П.Бондарєв, С.С.Войтусік, А.Я.Горпенюк, О.А.Нємкова, І.М.Журавель, Б.М.Березюк, Є.І.Яковенко, В.І.Отенко, І.Я.Тишик; за заг. ред. д-ра. техн. наук, проф. Ю.Я.Бобала та д-ра техн. наук, доц. І.В.Горбатого. – Львів: Видавництво Львівської політехніки, 2019. – 580 с. 35,9 обл.-вид. арк. Рекомендований Науково-методичною радою Національного університету “Львівська політехніка”. 2. В.М.Максимович, А.Я.Горпенюк, Ю.М.Костів, Н.М.Лужецька Цифрова схемотехніка. Елементи дискретних пристроїв інформаційно-комунікаційних систем. Навчальний посібник / – Львів: Видавництво Львівської політехніки, 2015р. – 136 c. 5,6 обл.-вид. арк. Рекомендований Науково-методичною радою Національного університету “Львівська політехніка”. Auxiliary: 3. IEEE 1364-2005 4. IEEE 1800-2012 - IEEE Standard for SystemVerilog Information resources: 1. iosifk.narod.ru/hdl_coding/verilog.htm 2. marsohod.org/verilog 3. www.rfwireless-world.com/source-code/ 4. Сайти провідних університетів
Уніфікований додаток: Lviv Polytechnic National University ensures the realization of the right of persons with disabilities to obtain higher education. Inclusive educational services are provided by the Service of accessibility to learning opportunities "Without restrictions", the purpose of which is to provide permanent individual support for the educational process of students with disabilities and chronic diseases. An important tool for the implementation of the inclusive educational policy at the University is the Program for improving the qualifications of scientific and pedagogical workers and educational and support staff in the field of social inclusion and inclusive education. Contact at: St. Karpinsky, 2/4, 1st floor, room 112 E-mail: nolimits@lpnu.ua Websites: https://lpnu.ua/nolimits https://lpnu.ua/integration
Академічна доброчесність: The policy regarding the academic integrity of the participants of the educational process is formed on the basis of compliance with the principles of academic integrity, taking into account the norms "Regulations on academic integrity at the Lviv Polytechnic National University" (approved by the academic council of the university on June 20, 2017, protocol No. 35).

Tools for Software Description of Cybersecurity Hardware Tools

Major: Management of Information Security
Code of subject: 7.125.03.E.017
Credits: 4.00
Department: Information Security
Lecturer: Ph.D., Associate Professor Horpenyuk A.Y.
Semester: 2 семестр
Mode of study: денна
Мета вивчення дисципліни: The purpose of teaching the discipline is to provide students with thorough knowledge of the theory and practice of analysis and design of electronic devices in the VERILOGHDL language, which is the basis for conducting research work, performing analysis of the obtained results, and assessing the accuracy of the developed model.
Завдання: general competences: GC3. Ability to abstract thinking, analysis and synthesis. professional competences of the specialty: PC3. Ability to research, develop and support methods and means of information security and/or cyber security at objects of information activity and critical infrastructure. PC10. The ability to conduct scientific and pedagogical activities, plan training, monitor and support work with personnel, as well as make effective decisions on information security and/or cyber security.
Learning outcomes: Learning outcomes: LO6. Analyze, develop and support the organization's information security and/or cyber security management system based on the information security strategy and policy: Teaching and learning methods: Lectures, classes - informational and perceptive method. Methods of evaluating the achievement of learning outcomes: Current verification in the process of assimilation of each topic being studied; evaluation of the student's activity in the course of lectures; exam - test control and oral survey. LO13. Research, develop, implement and use methods and means of cryptographic and technical information protection of business/operational processes, as well as analyze and provide an assessment of the effectiveness of their use in information systems, objects of information activity and critical infrastructure. LO16. Make informed decisions on organizational and technical issues of information security and/or cyber security in complex and unpredictable conditions, including using modern methods and means of optimization, forecasting and decision-making. LO 20. Set and solve complex engineering, applied and scientific problems of information security and/or cyber security, taking into account the requirements of domestic and international standards and best practices: Teaching and learning methods: Lectures – information-perceptive method, method of problem presentation. Laboratory works - reproductive method, heuristic method, Independent work - research method Methods of evaluating the achievement of learning outcomes: Current verification in the process of assimilation of each topic being studied; evaluation of the student's activity in the process of practical classes; checking the performance of laboratory work; verification of performance of control work; an oral survey on the assimilation of knowledge acquired in the process of performing laboratory work.
Required prior and related subjects: • Schematic engineering, • Cryptographic systems and protocols, • Fundamentals of scientific research and organization of science, • Design of SHI.
Summary of the subject: This discipline provides students with the necessary knowledge for effective analysis and design of electronic cyber security tools. The discipline examines classical and modern approaches to the design of electronic devices, their advantages, disadvantages and ways of development and improvement. The basics of the high-level VERILOGHDL language for describing electronic devices are studied: data categories and types, attributes, features of the program structure in the VERILOGHDL language, types of device architecture description, VERILOGHDL sequential operators, features of VERILOGHDL parallel operators, features of the description of basic digital blocks in the VERILOGHDL language.
Опис: Topic 1. Introduction. Topic 2. Levels of presentation and the process of design of NVIS (Levels of presentation and design of NVIS, Synthesis of implementations of designed schemes on the NVIS crystal, Models in system design on NVIS). Topic 3. Operators and data of the VERILOGHDL language (Basic elements of the VERILOGHDL language, Scalar data types, Complex data types, Pointer data types, VERILOGHDL language operators). Topic 4. Basic designs of models in the VERILOGHDL language (Structure of the description of the modeling object, Description of the behavior of the modeling object, Structural description of the modeling object). Topic 5. Designing on VERILOGHDL (Using VERILOGHDL structures for modeling, Features of VERILOGHDL programming for synthesis).
Assessment methods and criteria: • written reports on laboratory work, oral survey, control work (30%); • final control (70%, control measure, exam): written and oral form (70%).
Критерії оцінювання результатів навчання: Current control: 30 points (laboratory work 30 points). Examination control: 70 points (64 points written component, 6 points oral component). Total for the discipline: 100 points.
Порядок та критерії виставляння балів та оцінок: 100–88 points – (“excellent”) is awarded for a high level of knowledge (some inaccuracies are allowed) of the educational material of the component contained in the main and additional recommended literary sources, the ability to analyze the phenomena being studied in their interrelationship and development, clearly, succinctly, logically, consistently answer the questions, the ability to apply theoretical provisions when solving practical problems; 87–71 points – (“good”) is awarded for a generally correct understanding of the educational material of the component, including calculations, reasoned answers to the questions posed, which, however, contain certain (insignificant) shortcomings, for the ability to apply theoretical provisions when solving practical tasks; 70 – 50 points – (“satisfactory”) awarded for weak knowledge of the component’s educational material, inaccurate or poorly reasoned answers, with a violation of the sequence of presentation, for weak application of theoretical provisions when solving practical problems; 49-26 points - ("not certified" with the possibility of retaking the semester control) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to apply theoretical provisions when solving practical problems; 25-00 points - ("unsatisfactory" with mandatory re-study) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to navigate when solving practical problems, ignorance of the main fundamental provisions.
Recommended books: Educational and methodological support: 1. Горпенюк А.Я. Електронний навчально-методичний комплекс «Комп’ютерні методи високорівневого проектування пристроїв захисту» у Віртуальному середовищі Львівської політехніки. 2. Хомич С.В. Курс лекцій з дисципліни “Мови опису апаратних засобів”. 3. Горпенюк А.Я., Зеляновський Ю.Є. Навчальний посібник для проектування мовою VERILOG ПЛІС Altera (FPGA) у середовищі Quartus® II. 4. Проектування на VERILOG підстановок в S-блоках алгоритму шифрування DES. Методичні вказівки до лабораторної роботи № 1 з курсу " Комп’ютерні методи високорівневого проектування систем захисту" для студентів спеціальності 125 «Кібербезпека» /Укл.: А.Я.Горпенюк, Ю.Є.Зеляновський - Львів: Видавництво НУ “ЛП”, 2020.- 7 с. 5. Проектування на VERILOG перестановок алгоритму шифрування DES. Методичні вказівки до лабораторної роботи № 2 з курсу " Комп’ютерні методи високорівневого проектування систем захисту" для студентів спеціальності 125 «Кібербезпека» /Укл.: А.Я.Горпенюк, Ю.Є.Зеляновський - Львів: Видавництво НУ “ЛП”, 2020.- 10 с. 6. Проектування мовою VERILOG афінного перетворення алгоритму шифрування AES. Методичні вказівки до лабораторної роботи № 3 з курсу "Комп’ютерні методи високорівневого проектування систем захисту" для студентів спеціальності 125 «Кібербезпека» /Укл.: А.Я.Горпенюк, Ю.Є.Зеляновський - Львів: Видавництво НУ “ЛП”, 2020.- 13 с. 7. Проектування мовою VERILOG генератора псевдовипадкових чисел на регістрі зсуву з лінійним зворотним зв’язком. Методичні вказівки до лабораторної роботи № 4 з курсу "Комп’ютерні методи високорівневого проектування систем захисту" для студентів спеціальності 125 «Кібербезпека» /Укл.: А.Я.Горпенюк, Ю.Є.Зеляновський - Львів: Видавництво НУ “ЛП”, 2020.- 12 с. Recommended Books: Basic: 1. Бобало Ю.Я. Інформаційна безпека: навч. посібник / Ю.Я.Бобало, І.В.Горбатий, М.Д.Кіселичник, А.П.Бондарєв, С.С.Войтусік, А.Я.Горпенюк, О.А.Нємкова, І.М.Журавель, Б.М.Березюк, Є.І.Яковенко, В.І.Отенко, І.Я.Тишик; за заг. ред. д-ра. техн. наук, проф. Ю.Я.Бобала та д-ра техн. наук, доц. І.В.Горбатого. – Львів: Видавництво Львівської політехніки, 2019. – 580 с. 35,9 обл.-вид. арк. Рекомендований Науково-методичною радою Національного університету “Львівська політехніка”. 2. В.М.Максимович, А.Я.Горпенюк, Ю.М.Костів, Н.М.Лужецька Цифрова схемотехніка. Елементи дискретних пристроїв інформаційно-комунікаційних систем. Навчальний посібник / – Львів: Видавництво Львівської політехніки, 2015р. – 136 c. 5,6 обл.-вид. арк. Рекомендований Науково-методичною радою Національного університету “Львівська політехніка”. Auxiliary: 3. IEEE 1364-2005 4. IEEE 1800-2012 - IEEE Standard for SystemVerilog Information resources: 1. iosifk.narod.ru/hdl_coding/verilog.htm 2. marsohod.org/verilog 3. www.rfwireless-world.com/source-code/ 4. Сайти провідних університетів
Уніфікований додаток: Lviv Polytechnic National University ensures the realization of the right of persons with disabilities to obtain higher education. Inclusive educational services are provided by the Service of accessibility to learning opportunities "Without restrictions", the purpose of which is to provide permanent individual support for the educational process of students with disabilities and chronic diseases. An important tool for the implementation of the inclusive educational policy at the University is the Program for improving the qualifications of scientific and pedagogical workers and educational and support staff in the field of social inclusion and inclusive education. Contact at: St. Karpinsky, 2/4, 1st floor, room 112 E-mail: nolimits@lpnu.ua Websites: https://lpnu.ua/nolimits https://lpnu.ua/integration
Академічна доброчесність: The policy regarding the academic integrity of the participants of the educational process is formed on the basis of compliance with the principles of academic integrity, taking into account the norms "Regulations on academic integrity at the Lviv Polytechnic National University" (approved by the academic council of the university on June 20, 2017, protocol No. 35).