Ви переглядаєте архівну версію офіційного сайту НУЛП (2005-2020р.р.). Актуальна версія: https://lpnu.ua

Information Security Technology

Major: Computer Sciences
Code of Subject: 6.122.00.O.78
Credits: 5
Department: Automated Control Systems
Lecturer:
Semester: 3 семестр
Mode of Study: денна
Learning outcomes:
Required prior and related subjects:
Summary of the subject:
Recommended Books:
Assessment methods and criteria:

Information Security Technology

Major: Computer Sciences
Code of Subject: 6.122.00.O.80
Credits: 5
Department: Artificial Intelligence Systems
Lecturer: Matviychuk Ya.
Semester: 3 семестр
Mode of Study: денна
Learning outcomes:
As a result of studying the discipline, the student should know: the concept of security and reliability of information in digital networks; types of threats to information security; methods of protection of information on global and local digital networks; digital telephone networks; global positioning networks.
Required prior and related subjects:
Information theory
Summary of the subject:
The proposed training course will provide students with advanced theoretical and practical knowledge, skills and understanding relevant to information security technologies in modern information systems. The basics of cryptography and digital signature, information security in extended signal systems and digital telephony systems are studied. This enables them to effectively evaluate and design information security systems in information systems of various levels to meet the needs of science and business in various fields.
Recommended Books:
1. Антонюк А.О. Основи захисту інформації в автоматизованих системах / А.О. Антонюк : навч. пос. – Вид-во: Нац. ун-т „Києво-Могилянська академія”, 2003. – 244 с.
2. Згуровський М. З. Вступ до комп’ютерних інформаційних технологій / М. З. Згуровський, І. І. Коваленко, В. М. Михайленко : навч. пос. – Вид-во: „Європейський ун-т”, 2002. – 265 с.
3. Мандзій Б.А. Радіо- та оптичні тракти безпровідних інформаційних мереж / Б.А. Мандзій , Я.М Матвійчук , А.П. Бондарєв : консп. лек. – Вид-во: Нац. ун-т "Львівська політехніка", 2004. –49 с.

Assessment methods and criteria:
laboratory work - 30
estimated work - 40
exam - 60

Information Security Technology

Major: Computer Sciences
Code of Subject: 6.122.00.O.79
Credits: 5
Department: Computer-Aided Design
Lecturer: PhD. Ivantsiv Roman D. labs - PhD. Roman D. Ivantsiv.
Semester: 3 семестр
Mode of Study: денна
Learning outcomes:
The main provisions of the theory of information protection. Legislation in the field of information security. Software and hardware protection methods. Password protection. Requirements for identification and authentication, classification of means of identification and authentication. Security systems based on network screens. Methodology of information protection in computer systems and networks. The history of cryptography, know the ciphers that were used in the past, and know the modern computerized ciphers. Mathematical Foundations of Modern Information Protection Theory. Main directions of development of modern cryptography. Blocked ciphers based on the Fiestail network, RSA encryption. Electronic digital signatures. Technological construction of a comprehensive information security system. Determine the level of the threat and determine the required level of protection for the protected object, the ability to use standardized means of information security, the ability to demonstrate the knowledge of the scientific and mathematical principles that underlie the modern theory of information security. Effectively organize the protection of information in computer systems and networks, possess modern information security technologies, have sufficient qualification for designing and developing new means and methods of information security, study and use new promising methods of information security.
Required prior and related subjects:
Prerekvizyt: Algorithmization and programming, part 1 and part 2. Object-Oriented Programming. Theory of information. Korekvizyty: Methods and tools of computer information technology.Technologies for creating software products.
Summary of the subject:
Legislation in the field of information security. The main tasks of the information security system, the methodological basis for the construction of the information security system. The main threats and basic methods of information protection, statistical characteristics of encrypted and open texts, the history of cryptography and the mathematical foundations of modern theory of information security, software and hardware protection methods. Use of passwords and access control mechanisms. Identification and authentication, identification and authentication requirements, classification of authentication and authentication tools. Security issues and firewalls. Electronic digital signatures. Features of the implementation of a comprehensive information security system.
Recommended Books:
Яковина В.С., Федасюк Д.В. Основи безпеки комп’ютерних мереж: Навчальний посібник / За ред. Д.В. Федасюка. – Львів: НВФ «Україські технології», 2008. – 396 с. Новиков О.М. , Гайворонський М.В. Захист інформації в комп’ютерних системах і мережах. – К.: «Издательская группа bhv», 2006. – 496 с. Кавун С.В. Інформаційна безпека. Харківський національний економічний університет. Вид. НЕУ, 2009 – 366 с. Кузнецов О.О. Захист інформації в інформаційних системах. Методи традиційної криптографії. ХНЕУ. 2010 – 316 с. Усатенко Т.М. Криптологія. Суми.: 2008 - 164 с. В.Ємець, А.Мельник. Сучасна криптографія. Основні поняття. – Львів: 2007.
Assessment methods and criteria:
Current control (30%), current reports on laboratory work, tests, oral interviews;
Final control (70% of exam): written, testing, tasks, oral examination.