Ви переглядаєте архівну версію офіційного сайту НУЛП (2005-2020р.р.). Актуальна версія: https://lpnu.ua

Information Security Technology

Major: Computer Sciences and Information Technologies
Code of Subject: 6.122.00.O.97
Credits: 5
Department: Automated Control Systems
Lecturer: PhD, Associate professor Roman Martsyshyn
Semester: 7 семестр
Mode of Study: денна
Learning outcomes:
• Know the current security threats to information systems and basic methods of information protection in information systems.
• Know the technical, cryptographic and software methods of data protection.
• Know the organizational and legal principles of information security.
• Be able to provide software protection and information security from unauthorized actions.
• Be able to organize and execute practical actions of officials in information security department in accordance with the instructions and responsibilities.
• Be able to demonstrate knowledge and understanding of scientific and mathematical principles of information security.
• Be able to apply the acquired knowledge in information security profession in the development, establishment and operation of IS and related technologies.
Required prior and related subjects:
Prerequisites:
• Algorithmic and Programming. Part 1 and Part 2.
• Object-oriented programming.
• Operating Systems.
• Computer networks.
Сo-requisites:
• Basic theory of reliability.
Summary of the subject:
Review security system. Mechanisms and policies permissions. Methods and devices of protection and security. Protect, access and authentication. Models protection. Memory protection. Data encryption. Managing recovery. The main directions of modern cryptography. Mechanisms and protocols in PKI key management of information system. Network security. The main types of attacks, the principles of cryptanalysis. Basics of cryptography. The algorithms of the secret key. Algorithms for public key. Authentication protocol. Digital signatures. Use passwords and access control mechanisms. Security issues and firewalls.
Recommended Books:
• Есин В. И., Кузнецов А. А., Сорока Л. С. Безопасность информационных систем и технологий – Х.:ООО «ЭДЭНА», 2010.-656с.
• Бабак В.П. Теоретичні основи захисту інформації: Підручник. .:Книжкове видавництво НАУ, 2008. - 752с
• Горбенко І. Д. Гриненко Т. О. Захист інформації в інформаційно- телекомунікаційних системах: Навч. посібник. Ч.1. Криптографічний захист інформації - Харків: ХНУРЕ, 2004 - 368 с.
Assessment methods and criteria:
written reports on laboratory work, oral examination (20%)
final control (control measure), written-oral form (80%)

Information Security Technology

Major: Computer Sciences and Information Technologies
Code of Subject: 6.122.00.O.99
Credits: 5
Department: Information Systems and Networks
Lecturer: Ph.D., Associate Professor Basyuk Taras Mykhailovych
Semester: 7 семестр
Mode of Study: денна
Learning outcomes:
• know the characteristics of maintaining a secure of computer systems and networks
• know the basic technologies of secure information systems engineering
• be able to determine the necessary extent, strategy and ways to protect data
• be able to apply cryptographic algorithms for protected systems engineering
Required prior and related subjects:
• Problem-Oriented Programming
• Algorithmic Theory
• Object-oriented Programming
• Information Technologies of Computer Networks
• Distributed Database Systems and Knowledge
Summary of the subject:
Information security of computer systems and networks. Main directions of security provision of computer networks. The principles of information security. Organization of information exchange in computer networks. Concept of information security. Analysis of security level. Methods for testing system security. The existing security architecture: ISO, DOD, IETF. The basic recommendations for the application of ways and means of data security. Security architecture of computer systems. Passive and active means of influencing the computer network. Methods and means of data protection. Features of firewalls operation. Filtering routers, gateways, network-layer gateways, application layer gatways. Identification and authentication of users. Biometric methods of protection. The concept of secure virtual networks (VPN). Managing of cryptographic keys. Scheme of Kerberos protocol opertion. Algorithm for open distribution of Diffie-Hellman keys. SKIP Protocol to control coded keys. Protection of software from the study. The structure of the protected program. Electronic signature. Algorithms RSA, DSA and El Gamal. Information security in electronic payment systems. The security of electronic payments. Review of IOTP / PAPI means.
Recommended Books:
1. Белов Е. Б. Основы информационной безопасности. Учебное пособие для вузов / Е.Б. Белов, В.П. Лось, Р. В. Мещеряков, А. А. Шелупанов – М.: Горячая линия - Телеком, 2006. – 544 с.
2. Биячуев Т.А. Безопасность корпоративных сетей / Т.А. Биячуев – СПб.: ИТМО, 2014.
3. Богуш В.М. Інформаційна безпека: термінологічний навчальний довідник / В.М. Богуш, В.Г. Кривуца, А.М. Кудін – К.: Д.В.К., 2010. – 508 с.
4. Соколов А. В. Защита информации в распределенных корпоративных сетях и системах / А. В. Соколов, В.Ф. Шаньгин – М.: ДМК Пресс, 2012. – 656 с.
5. Девянин П.Н. Теоретические основы компьютерной безопасности: Учеб. пособие для вузов / П.Н. Девянин, О.О. Михальский, Д.И. Правиков – М.: Радио и связь, 2010. – 192с.
Assessment methods and criteria:
• Current control (30%): written reports on laboratory work, oral examination;
• Final control (70% of exam): in written, verbally.

Information Security Technology

Major: Computer Sciences and Information Technologies
Code of Subject: 6.122.00.O.98
Credits: 5
Department: Computer-Aided Design
Lecturer: PhD. Ivantsiv Roman D. labs - PhD. Roman D. Ivantsiv.
Semester: 7 семестр
Mode of Study: денна
Learning outcomes:
The main provisions of the theory of information protection. Legislation in the field of information security. Software and hardware protection methods. Password protection. Requirements for identification and authentication, classification of means of identification and authentication. Security systems based on network screens. Methodology of information protection in computer systems and networks. The history of cryptography, know the ciphers that were used in the past, and know the modern computerized ciphers. Mathematical Foundations of Modern Information Protection Theory. Main directions of development of modern cryptography. Blocked ciphers based on the Fiestail network, RSA encryption. Electronic digital signatures. Technological construction of a comprehensive information security system. Determine the level of the threat and determine the required level of protection for the protected object, the ability to use standardized means of information security, the ability to demonstrate the knowledge of the scientific and mathematical principles that underlie the modern theory of information security. Effectively organize the protection of information in computer systems and networks, possess modern information security technologies, have sufficient qualification for designing and developing new means and methods of information security, study and use new promising methods of information security.
Required prior and related subjects:
• prerekvizyt, Algorithmization and programming, part 1 and part 2. Object-Oriented Programming. Theory of information.
• korekvizyty: Methods and tools of computer information technology.Technologies for creating software products
Summary of the subject:
Legislation in the field of information security. The main tasks of the information security system, the methodological basis for the construction of the information security system. The main threats and basic methods of information protection, statistical characteristics of encrypted and open texts, the history of cryptography and the mathematical foundations of modern theory of information security, software and hardware protection methods. Use of passwords and access control mechanisms. Identification and authentication, identification and authentication requirements, classification of authentication and authentication tools. Security issues and firewalls. Electronic digital signatures. Features of the implementation of a comprehensive information security system.
Recommended Books:
1. Яковина В.С., Федасюк Д.В. Основи безпеки комп’ютерних мереж: Навчальний посібник / За ред. Д.В. Федасюка. – Львів: НВФ «Україські технології», 2008. – 396 с.
2. Новиков О.М. , Гайворонський М.В. Захист інформації в комп’ютерних системах і мережах. – К.: «Издательская группа bhv», 2006. – 496 с.
3. Кавун С.В. Інформаційна безпека. Харківський національний економічний університет. Вид. НЕУ, 2009 – 366 с.
4. Кузнецов О.О. Захист інформації в інформаційних системах. Методи традиційної криптографії. ХНЕУ. 2010 – 316 с.
5. Усатенко Т.М. Криптологія. Суми.: 2008 - 164 с.
6. В.Ємець, А.Мельник. Сучасна криптографія. Основні поняття. – Львів: 2007.
7. Іванців.Р.Д. Методи шифрування та дешифрування текстових повідомлень. Методичні вказівки до циклу лабораторних робіт 1 – 4 з курсу “Технолоогії захисту інформації” для студентів базового напряму 6.050101 “Компютерні науки”. Затверджено на засіданні кафедри “Системи автоматизації проектування” Протокол № 1 від 25.08.2015 р.
8. Іванців.Р.Д. Сучасні комп’ютеризовані методи шифрування та дешифрування текстових повідомлень. Методичні вказівки до циклу лабораторних робіт 5 – 8 з курсу “Технолоогії захисту інформації” для студентів базового напряму 6.050101 “Компютерні науки”. Затверджено на засіданні кафедри “Системи автоматизації проектування” Протокол № 1 від 25.08.2015 р.
9. Іванців.Р.Д. Методичні вказівки до виконання самостійної роботи з курсу “Технолоогії захисту інформації” для студентів базового напряму 6.050101 “Компютерні науки”. Затверджено на засіданні кафедри “Системи автоматизації проектування” Протокол № 1 від 25.08.2015 р.
10. Shannon C. E. Communication Theory of Secrecy
Assessment methods and criteria:
• Current control (30%), current reports on laboratory work, tests, oral interviews;
• Final control (70% of exam): written, testing, tasks, oral examination.

Information Security Technology

Major: Computer Sciences and Information Technologies
Code of Subject: 6.122.00.O.100
Credits: 5
Department: Applied Mathematics
Lecturer:
Semester: 7 семестр
Mode of Study: денна
Learning outcomes:
Required prior and related subjects:
Summary of the subject:
Recommended Books:
Assessment methods and criteria: