Ви переглядаєте архівну версію офіційного сайту НУЛП (2005-2020р.р.). Актуальна версія: https://lpnu.ua

Constructional Design of Integrated Information Protection Systems

Major: Information security management
Code of Subject: 7.125.03.O.4
Credits: 5
Department: Information Security
Lecturer: Parkhuts Lyubomyr Teodorovych
Semester: 1 семестр
Mode of Study: денна
Learning outcomes:
As a result of studying the discipline the student should be able to demonstrate the following learning outcomes:
know:
- based on the sources and routes of leaks;
- how unauthorized interception;
- basic technical equipment used for unauthorized interception;
- Methods and data protection;
- the main technical tools used to protect information from unauthorized interception;
- order the design of information security.

Study discipline involves the formation and development of students' competencies:
general:
- ability to solve tasks and take appropriate informed decisions;
- the ability to conduct research at an appropriate level, have research skills are the ability to form (making a presentation or presenting reports) new products in their chosen field, choose the appropriate guidelines and appropriate methods for their implementation;
- Knowledge and understanding of the subject area and understanding of the profession;
- ability to use information and communication technologies, software implementation and use of existing ones;
- the ability to assess and maintain the quality of the work performed;
- creativity, ability to systems thinking;
- the potential for further education;
professional:
- the ability to plan and implement appropriate measures to protect information in the information and communication systems;
- the ability to use skills for detection and blocking of channels and methods of unauthorized access to information sources and methods destabilizing influence to information;
- the ability to use the skills to participate in the preparation of technical documentation; CISS implementation of technical operation on objects of professional activity, designed for the collection, processing, storage and transmission of information; - ability to design systems of protection and security of information and their elements with all aspects of the problem, including the creation, installation, operation, maintenance and disposal;
- the ability to justify and implement a system of protection of information resources with limited access to facilities information activities;
- the ability to conduct certification (based on records and surveys) operational areas (zones), etc. in areas subject to the secrecy of fixation results in the relevant documents.
- the ability to assess the suitability of information security to the purpose of the automated system according to the requirements of existing standards;
- the ability to analyze risks to assess real threats to security breach and protection.
Required prior and related subjects:
Fundamentals of Information Security
Methods and data protection
Complex systems authorized access
Systems of technical protection of information
Summary of the subject:
The subject of discipline are: explore modern methods of designing information security systems; set of basic theoretical positions creating information security systems; processes ensure the necessary level of information security; Design features technology and security information on objects.
Recommended Books:
1.DSTU 3396.0-96. Data protection. Technical protection. Substantive provisions.
2.DSTU 3396.1-96. Data protection. Technical protection. The order of operations.
3.ND 1.1.a 002-99. General information protection in computer systems from unauthorized access.
4.ND Heat 004-99. Criteria for evaluating information security in computer systems from unauthorized access.
5.ND Heat 005-99. Classification of automated systems and standard functional profiles processed information protection from unauthorized access.
6.ND Heat 001-99. Guidelines for the development of technical specifications for the creation of information security in automated systems.
7.Poryadok of certification of technical means of information protection purpose.
8.ND 1.4.-001-2000. Model provision of security services in an automated system.
9.Tymchasove provision katehoriyuvannya objects (TPKO - 95).
10.ND 2.7.- Heat 001-99. Technical information security on program-controlled PBX public. The order of performance.
11.ND 3.6.-001-2000. Technical protection. Computer systems. The establishment, implementation, maintenance and modernization of the mechanical means of protecting information from unauthorized access.
12.ND 3.7.- Heat 002-99. Technical information security on program-controlled PBX public. Methods of assessing information security (basic).
13.ND 4.7.- 002-2001. Definition voice information security leaks acoustic and vibroacoustic channels.
Assessment methods and criteria:
Diagnosis is made through knowledge test examinations on lectures and workshops, as well as protection course project.

Constructional Design of Integrated Information Protection Systems (курсовий проект)

Major: Information security management
Code of Subject: 7.125.03.O.8
Credits: 3
Department: Information Security
Lecturer: Parkhuts Lyubomyr Teodorovych
Semester: 1 семестр
Mode of Study: денна
Learning outcomes:
As a result of studying the discipline the student should be able to demonstrate the following learning outcomes:
know:
- based on the sources and routes of leaks;
- how unauthorized interception;
- basic technical equipment used for unauthorized interception;
- Methods and data protection;
- the main technical tools used to protect information from unauthorized interception;
- order the design of information security.

Study discipline involves the formation and development of students' competencies:
general:
- ability to solve tasks and take appropriate informed decisions;
- the ability to conduct research at an appropriate level, have research skills are the ability to form (making a presentation or presenting reports) new products in their chosen field, choose the appropriate guidelines and appropriate methods for their implementation;
- Knowledge and understanding of the subject area and understanding of the profession;
- ability to use information and communication technologies, software implementation and use of existing ones;
- the ability to assess and maintain the quality of the work performed;
- creativity, ability to systems thinking;
- the potential for further education;
professional:
- the ability to plan and implement appropriate measures to protect information in the information and communication systems;
- the ability to use skills for detection and blocking of channels and methods of unauthorized access to information sources and methods destabilizing influence to information;
- the ability to use the skills to participate in the preparation of technical documentation; CISS implementation of technical operation on objects of professional activity, designed for the collection, processing, storage and transmission of information; - ability to design systems of protection and security of information and their elements with all aspects of the problem, including the creation, installation, operation, maintenance and disposal;
- the ability to justify and implement a system of protection of information resources with limited access to facilities information activities;
- the ability to conduct certification (based on records and surveys) operational areas (zones), etc. in areas subject to the secrecy of fixation results in the relevant documents.
- the ability to assess the suitability of information security to the purpose of the automated system according to the requirements of existing standards;
- the ability to analyze risks to assess real threats to security breach and protection.
Required prior and related subjects:
Fundamentals of Information Security
Methods and data protection
Complex systems authorized access
Systems of technical protection of information
Summary of the subject:
The subject of discipline are: explore modern methods of designing information security systems; set of basic theoretical positions creating information security systems; processes ensure the necessary level of information security; Design features technology and security information on objects.
Recommended Books:
1.DSTU 3396.0-96. Data protection. Technical protection. Substantive provisions.
2.DSTU 3396.1-96. Data protection. Technical protection. The order of operations.
3.ND 1.1.a 002-99. General information protection in computer systems from unauthorized access.
4.ND Heat 004-99. Criteria for evaluating information security in computer systems from unauthorized access.
5.ND Heat 005-99. Classification of automated systems and standard functional profiles processed information protection from unauthorized access.
6.ND Heat 001-99. Guidelines for the development of technical specifications for the creation of information security in automated systems.
7.Poryadok of certification of technical means of information protection purpose.
8.ND 1.4.-001-2000. Model provision of security services in an automated system.
9.Tymchasove provision katehoriyuvannya objects (TPKO - 95).
10.ND 2.7.- Heat 001-99. Technical information security on program-controlled PBX public. The order of performance.
11.ND 3.6.-001-2000. Technical protection. Computer systems. The establishment, implementation, maintenance and modernization of the mechanical means of protecting information from unauthorized access.
12.ND 3.7.- Heat 002-99. Technical information security on program-controlled PBX public. Methods of assessing information security (basic).
13.ND 4.7.- 002-2001. Definition voice information security leaks acoustic and vibroacoustic channels.
Assessment methods and criteria:
Diagnosis is made through knowledge test examinations on lectures and workshops, as well as protection course project.