Risk Evaluation and Recovery Planning of Information Systems

Major: Cybersecurity
Code of subject: 6.125.03.E.108
Credits: 4.00
Department: Information Security
Semester: 6 семестр
Mode of study: денна

Risk Evaluation and Recovery Planning of Information Systems

Major: Cybersecurity
Code of subject: 6.125.04.E.127
Credits: 4.00
Department: Information Security
Lecturer: Ph.D., Associate Professor Prokopyshyn Ivan Anatoliyovych
Semester: 6 семестр
Mode of study: денна
Мета вивчення дисципліни: The purpose of teaching the discipline is to teach students methods of analysis and assessment of information security risks, methods of ensuring the continuity of functioning and disaster recovery of information systems.
Завдання: The study of the academic discipline in accordance with the OPP of the bachelor's specialty 125 Cybersecurity involves the formation of the following competencies in the students of education: ZK 2. Knowledge and understanding of the subject area and understanding of the profession. ZK 4. The ability to identify, pose and solve problems in a professional direction. ZK 5. Ability to search, process and analyze information. FCS 4.2. The ability to write a cyber security policy at the object of information activity, based on international and domestic standards, as well as apply the best existing practices. FCS 4.3. Ability to work with information security incidents, perform their assessment, prioritize and analyze incidents. FCS 4.4. Ability to process and analyze event logs, ability to develop parsers. FCS 4.6. Ability to conduct forensic examination of traces of cyber attacks in cyber space. FCS 4.9. Ability to perform data, computer abuse and anomaly monitoring. FCS 4.10. The ability to analyze information provided by information systems in order to identify typical signs of possible unauthorized access.
Learning outcomes: As a result of studying the academic discipline, the student must be able to demonstrate the following program learning outcomes: ZN 3. To use the results of independent search, analysis and synthesis of information from various sources for the effective solution of specialized tasks of professional activity. ZN 4. Analyze, argue, make decisions when solving complex specialized tasks and practical problems in professional activity, which are characterized by complexity and incomplete determination of conditions, be responsible for the decisions made. ZN 7. Act on the basis of the legislative and regulatory framework of Ukraine and the requirements of relevant standards, including international ones in the field of information and/or cyber security. ZN 4.1. Solve the task of protecting programs and information processed in information and telecommunication systems by means of hardware and software and evaluate the effectiveness of the quality of the decisions made. ZN 4.4. Analyze and evaluate the effectiveness and level of security of resources of various classes in information and information and telecommunication (automated) systems during testing in accordance with the established information and/or cyber security policy. ZN 4.7. Apply protection theories and methods to ensure the security of elements of information and telecommunication systems. ЗН 4.8. Solve the tasks of managing the processes of restoring the regular functioning of information and telecommunication systems using backup procedures in accordance with the established security policy. ЗН 4.9. To solve the problems of ensuring the continuity of business processes of the organization on the basis of risk theory. ZN 4.10. Participate in the development and implementation of an information security and/or cyber security strategy in accordance with the goals and objectives of the organization.
Required prior and related subjects: CK1.3. Basics of information and cyber security SK2.6. Methods and means of technical information protection CK1.7. Higher mathematics, part 2 SK2.16. Management of information security
Summary of the subject: Basic concepts and principles of information security. Basic concepts of reliability theory, structural models of reliability of complex systems. Evaluation of the reliability of hardware and software means of information protection. Concept of risk. Risk analysis: assets, vulnerabilities, threats, protection. Qualitative and quantitative assessment of information risk. Stochastic risk modeling, methods of calculating risk indicators. Economic assessment of risk and effectiveness of investments in information protection systems. Business continuity and information security. Disaster recovery planning. Business Continuity and Recovery Management Standards and Best Practices. Disaster recovery planning of information systems.
Опис: Names of sections and topics of the academic discipline. 1) Risks in the field of information security 1. The main content of the discipline. Concept of risk. Probabilistic and economic aspects of risk. The nature and main types of risk in the field of information security. 2. Information security management systems (ISMS). The role and place of risk analysis and management in ISMS. 2) Financial and economic calculations in the field of defense 3. Time value of money. Compounding and discounting at simple and compound interest rates. 4. Flows of payments, financial rents. Calculation of the cost of the flow of payments for a certain point in time. 5. Indicators of financial performance of investments: net present value, future value, yield index, internal rate of return and their calculation. Economic efficiency of protection systems. 3) Reliability of hardware and software in protection systems 6. Basics of probability theory and mathematical statistics. Basic concepts of reliability theory: reliability function, intensity of failures. 7. Reliability indicators of non-renewable elements. Reliability indicators of renewable devices. 8. Structural reliability models of complex systems. Logical graphic methods of reliability analysis. 9. Evaluation of the reliability of hardware and software means of information protection. 4) Information security (IS) risk management 10. Risk assessment. Qualitative assessment of information risk. Quantitative assessment of risk. 11. Treatment of IS risks. Selection of countermeasures and risk management. 12. Standards and methods of information security and risk management 5) Economic assessment of risk and effectiveness of protection 13. Basic concepts of probability theory for risk assessment 14. Mathematical modeling of risk. Coherent measures of risk. 15. Value at Risk (VaR) risk measure and its properties. 16. Structural and logical description of conservative protection systems: protection objects, channels for attacks, means of protection. Discrete probabilistic model of losses caused by damage to protection objects. 17. Assessment of economic risk and effectiveness of protection systems. 6) Planning the restoration of information systems 18. Business continuity and information security 19. Disaster recovery planning 20. Standards and Best Practices for Business Continuity Management and Recovery 21. Planning emergency recovery of network services 22. Planning for emergency backup and data recovery. 23. Disaster recovery scenarios for cloud services.
Assessment methods and criteria: Current control of classroom classes is carried out with the aim of clarifying the circumstances of the educational process, determining its results in the following forms: • preliminary detection of students' knowledge level before classes begin; • current check in the process of assimilation of each topic being studied; • evaluation of the student's activity in the course of lectures; • assessment of the student's activity in the process of practical classes; • verification of performance of practical works; • checking the performance of control works; • oral examination of knowledge acquisition in practical and lecture classes. Final (examination) control is carried out based on the results of test control and oral survey.
Критерії оцінювання результатів навчання: Current survey, criterion - correct answers, up to 5 points for one answer, total - up to 10 points. Homework, the criterion is the quality of homework, up to 10 points for one task, up to 20 points in total. Control measures, the criterion is the performance of a control test, up to 10 points. Exam, criterion - test control, up to 50 points; oral component - up to 10 points.
Порядок та критерії виставляння балів та оцінок: 100–88 points – (“excellent”) is awarded for a high level of knowledge (some inaccuracies are allowed) of the educational material of the component contained in the main and additional recommended literary sources, the ability to analyze the phenomena being studied in their relationship and development, clearly, succinctly, logically, consistently answer the questions, the ability to apply theoretical provisions when solving practical problems; 87–71 points – (“good”) is awarded for a generally correct understanding of the educational material of the component, including calculations, reasoned answers to the questions posed, which, however, contain certain (insignificant) shortcomings, for the ability to apply theoretical provisions when solving practical tasks; 70 – 50 points – (“satisfactory”) is given for weak knowledge of the component’s educational material, inaccurate or poorly reasoned answers, with a violation of the sequence of presentation, for weak application of theoretical provisions when solving practical problems; 49-26 points - ("not certified" with the possibility of retaking the semester control) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to apply theoretical provisions when solving practical problems; 25-00 points - ("unsatisfactory" with mandatory re-study) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to navigate when solving practical problems, ignorance of the main fundamental provisions.
Recommended books: 1. DSTU ISO/IEC 27005:2015. Information Technology. Protection methods. Information security risk management. 2. DSTU ISO/IEC 31010:2013. Methods of general risk assessment. 3. DSTU EN ISO 22301:2017 Safety of society. Business continuity management systems. Requirements 4. Zabolotskyi M. V. Basics of financial mathematics: teaching. manual / M. V. Zabolotskyi, I. A. Prokopyshyn. – Lviv: LNU named after Ivan Franko, 2016. - 144 c. 5. Korchenko O.G., Kazmirchuk S.V., Akhmetov B.B. Applied risk assessment systems. – Kyiv: CP "Comprint", 2017. – 435 p. 6. Romaka V. A. Management in the sphere of information protection: a textbook / V. A. Romaka, R. O. Korzh, Yu. R. Garasym. - Lviv: ZUKTS, 2013. - 462 p. 7. ISO 22301:2019 Societal security – Business continuity management systems – Requirements. 8. ISO 22316:2017 Security and resilience – Organizational resilience – Principles and attributes.
Уніфікований додаток: Lviv Polytechnic National University ensures the realization of the right of persons with disabilities to obtain higher education. Inclusive educational services are provided by the Service of accessibility to learning opportunities "Without restrictions", the purpose of which is to provide permanent individual support for the educational process of students with disabilities and chronic diseases. An important tool for the implementation of the inclusive educational policy at the University is the Program for improving the qualifications of scientific and pedagogical workers and educational and support staff in the field of social inclusion and inclusive education. Contact at: St. Karpinsky, 2/4, 1st floor, room 112 E-mail: nolimits@lpnu.ua Websites: https://lpnu.ua/nolimits https://lpnu.ua/integration
Академічна доброчесність: The policy regarding the academic integrity of participants in the educational process is formed on the basis of compliance with the principles of academic integrity, taking into account the norms "Regulations on academic integrity at the Lviv Polytechnic National University" (approved by the academic council of the university on June 20, 2017, protocol No. 35).