Ви переглядаєте архівну версію офіційного сайту НУЛП (2005-2020р.р.). Актуальна версія: https://lpnu.ua
Constructional Design of Integrated Information Protection Systems
Major: Information security management
Code of Subject: 7.125.03.O.4
Credits: 5
Department: Information Security
Lecturer: Parkhuts Lyubomyr Teodorovych
Semester: 1 семестр
Mode of Study: денна
Learning outcomes:
As a result of studying the discipline the student should be able to demonstrate the following learning outcomes:
know:
- based on the sources and routes of leaks;
- how unauthorized interception;
- basic technical equipment used for unauthorized interception;
- Methods and data protection;
- the main technical tools used to protect information from unauthorized interception;
- order the design of information security.
Study discipline involves the formation and development of students' competencies:
general:
- ability to solve tasks and take appropriate informed decisions;
- the ability to conduct research at an appropriate level, have research skills are the ability to form (making a presentation or presenting reports) new products in their chosen field, choose the appropriate guidelines and appropriate methods for their implementation;
- Knowledge and understanding of the subject area and understanding of the profession;
- ability to use information and communication technologies, software implementation and use of existing ones;
- the ability to assess and maintain the quality of the work performed;
- creativity, ability to systems thinking;
- the potential for further education;
professional:
- the ability to plan and implement appropriate measures to protect information in the information and communication systems;
- the ability to use skills for detection and blocking of channels and methods of unauthorized access to information sources and methods destabilizing influence to information;
- the ability to use the skills to participate in the preparation of technical documentation; CISS implementation of technical operation on objects of professional activity, designed for the collection, processing, storage and transmission of information; - ability to design systems of protection and security of information and their elements with all aspects of the problem, including the creation, installation, operation, maintenance and disposal;
- the ability to justify and implement a system of protection of information resources with limited access to facilities information activities;
- the ability to conduct certification (based on records and surveys) operational areas (zones), etc. in areas subject to the secrecy of fixation results in the relevant documents.
- the ability to assess the suitability of information security to the purpose of the automated system according to the requirements of existing standards;
- the ability to analyze risks to assess real threats to security breach and protection.
know:
- based on the sources and routes of leaks;
- how unauthorized interception;
- basic technical equipment used for unauthorized interception;
- Methods and data protection;
- the main technical tools used to protect information from unauthorized interception;
- order the design of information security.
Study discipline involves the formation and development of students' competencies:
general:
- ability to solve tasks and take appropriate informed decisions;
- the ability to conduct research at an appropriate level, have research skills are the ability to form (making a presentation or presenting reports) new products in their chosen field, choose the appropriate guidelines and appropriate methods for their implementation;
- Knowledge and understanding of the subject area and understanding of the profession;
- ability to use information and communication technologies, software implementation and use of existing ones;
- the ability to assess and maintain the quality of the work performed;
- creativity, ability to systems thinking;
- the potential for further education;
professional:
- the ability to plan and implement appropriate measures to protect information in the information and communication systems;
- the ability to use skills for detection and blocking of channels and methods of unauthorized access to information sources and methods destabilizing influence to information;
- the ability to use the skills to participate in the preparation of technical documentation; CISS implementation of technical operation on objects of professional activity, designed for the collection, processing, storage and transmission of information; - ability to design systems of protection and security of information and their elements with all aspects of the problem, including the creation, installation, operation, maintenance and disposal;
- the ability to justify and implement a system of protection of information resources with limited access to facilities information activities;
- the ability to conduct certification (based on records and surveys) operational areas (zones), etc. in areas subject to the secrecy of fixation results in the relevant documents.
- the ability to assess the suitability of information security to the purpose of the automated system according to the requirements of existing standards;
- the ability to analyze risks to assess real threats to security breach and protection.
Required prior and related subjects:
Fundamentals of Information Security
Methods and data protection
Complex systems authorized access
Systems of technical protection of information
Methods and data protection
Complex systems authorized access
Systems of technical protection of information
Summary of the subject:
The subject of discipline are: explore modern methods of designing information security systems; set of basic theoretical positions creating information security systems; processes ensure the necessary level of information security; Design features technology and security information on objects.
Recommended Books:
1.DSTU 3396.0-96. Data protection. Technical protection. Substantive provisions.
2.DSTU 3396.1-96. Data protection. Technical protection. The order of operations.
3.ND 1.1.a 002-99. General information protection in computer systems from unauthorized access.
4.ND Heat 004-99. Criteria for evaluating information security in computer systems from unauthorized access.
5.ND Heat 005-99. Classification of automated systems and standard functional profiles processed information protection from unauthorized access.
6.ND Heat 001-99. Guidelines for the development of technical specifications for the creation of information security in automated systems.
7.Poryadok of certification of technical means of information protection purpose.
8.ND 1.4.-001-2000. Model provision of security services in an automated system.
9.Tymchasove provision katehoriyuvannya objects (TPKO - 95).
10.ND 2.7.- Heat 001-99. Technical information security on program-controlled PBX public. The order of performance.
11.ND 3.6.-001-2000. Technical protection. Computer systems. The establishment, implementation, maintenance and modernization of the mechanical means of protecting information from unauthorized access.
12.ND 3.7.- Heat 002-99. Technical information security on program-controlled PBX public. Methods of assessing information security (basic).
13.ND 4.7.- 002-2001. Definition voice information security leaks acoustic and vibroacoustic channels.
2.DSTU 3396.1-96. Data protection. Technical protection. The order of operations.
3.ND 1.1.a 002-99. General information protection in computer systems from unauthorized access.
4.ND Heat 004-99. Criteria for evaluating information security in computer systems from unauthorized access.
5.ND Heat 005-99. Classification of automated systems and standard functional profiles processed information protection from unauthorized access.
6.ND Heat 001-99. Guidelines for the development of technical specifications for the creation of information security in automated systems.
7.Poryadok of certification of technical means of information protection purpose.
8.ND 1.4.-001-2000. Model provision of security services in an automated system.
9.Tymchasove provision katehoriyuvannya objects (TPKO - 95).
10.ND 2.7.- Heat 001-99. Technical information security on program-controlled PBX public. The order of performance.
11.ND 3.6.-001-2000. Technical protection. Computer systems. The establishment, implementation, maintenance and modernization of the mechanical means of protecting information from unauthorized access.
12.ND 3.7.- Heat 002-99. Technical information security on program-controlled PBX public. Methods of assessing information security (basic).
13.ND 4.7.- 002-2001. Definition voice information security leaks acoustic and vibroacoustic channels.
Assessment methods and criteria:
Diagnosis is made through knowledge test examinations on lectures and workshops, as well as protection course project.
Constructional Design of Integrated Information Protection Systems (курсовий проект)
Major: Information security management
Code of Subject: 7.125.03.O.8
Credits: 3
Department: Information Security
Lecturer: Parkhuts Lyubomyr Teodorovych
Semester: 1 семестр
Mode of Study: денна
Learning outcomes:
As a result of studying the discipline the student should be able to demonstrate the following learning outcomes:
know:
- based on the sources and routes of leaks;
- how unauthorized interception;
- basic technical equipment used for unauthorized interception;
- Methods and data protection;
- the main technical tools used to protect information from unauthorized interception;
- order the design of information security.
Study discipline involves the formation and development of students' competencies:
general:
- ability to solve tasks and take appropriate informed decisions;
- the ability to conduct research at an appropriate level, have research skills are the ability to form (making a presentation or presenting reports) new products in their chosen field, choose the appropriate guidelines and appropriate methods for their implementation;
- Knowledge and understanding of the subject area and understanding of the profession;
- ability to use information and communication technologies, software implementation and use of existing ones;
- the ability to assess and maintain the quality of the work performed;
- creativity, ability to systems thinking;
- the potential for further education;
professional:
- the ability to plan and implement appropriate measures to protect information in the information and communication systems;
- the ability to use skills for detection and blocking of channels and methods of unauthorized access to information sources and methods destabilizing influence to information;
- the ability to use the skills to participate in the preparation of technical documentation; CISS implementation of technical operation on objects of professional activity, designed for the collection, processing, storage and transmission of information; - ability to design systems of protection and security of information and their elements with all aspects of the problem, including the creation, installation, operation, maintenance and disposal;
- the ability to justify and implement a system of protection of information resources with limited access to facilities information activities;
- the ability to conduct certification (based on records and surveys) operational areas (zones), etc. in areas subject to the secrecy of fixation results in the relevant documents.
- the ability to assess the suitability of information security to the purpose of the automated system according to the requirements of existing standards;
- the ability to analyze risks to assess real threats to security breach and protection.
know:
- based on the sources and routes of leaks;
- how unauthorized interception;
- basic technical equipment used for unauthorized interception;
- Methods and data protection;
- the main technical tools used to protect information from unauthorized interception;
- order the design of information security.
Study discipline involves the formation and development of students' competencies:
general:
- ability to solve tasks and take appropriate informed decisions;
- the ability to conduct research at an appropriate level, have research skills are the ability to form (making a presentation or presenting reports) new products in their chosen field, choose the appropriate guidelines and appropriate methods for their implementation;
- Knowledge and understanding of the subject area and understanding of the profession;
- ability to use information and communication technologies, software implementation and use of existing ones;
- the ability to assess and maintain the quality of the work performed;
- creativity, ability to systems thinking;
- the potential for further education;
professional:
- the ability to plan and implement appropriate measures to protect information in the information and communication systems;
- the ability to use skills for detection and blocking of channels and methods of unauthorized access to information sources and methods destabilizing influence to information;
- the ability to use the skills to participate in the preparation of technical documentation; CISS implementation of technical operation on objects of professional activity, designed for the collection, processing, storage and transmission of information; - ability to design systems of protection and security of information and their elements with all aspects of the problem, including the creation, installation, operation, maintenance and disposal;
- the ability to justify and implement a system of protection of information resources with limited access to facilities information activities;
- the ability to conduct certification (based on records and surveys) operational areas (zones), etc. in areas subject to the secrecy of fixation results in the relevant documents.
- the ability to assess the suitability of information security to the purpose of the automated system according to the requirements of existing standards;
- the ability to analyze risks to assess real threats to security breach and protection.
Required prior and related subjects:
Fundamentals of Information Security
Methods and data protection
Complex systems authorized access
Systems of technical protection of information
Methods and data protection
Complex systems authorized access
Systems of technical protection of information
Summary of the subject:
The subject of discipline are: explore modern methods of designing information security systems; set of basic theoretical positions creating information security systems; processes ensure the necessary level of information security; Design features technology and security information on objects.
Recommended Books:
1.DSTU 3396.0-96. Data protection. Technical protection. Substantive provisions.
2.DSTU 3396.1-96. Data protection. Technical protection. The order of operations.
3.ND 1.1.a 002-99. General information protection in computer systems from unauthorized access.
4.ND Heat 004-99. Criteria for evaluating information security in computer systems from unauthorized access.
5.ND Heat 005-99. Classification of automated systems and standard functional profiles processed information protection from unauthorized access.
6.ND Heat 001-99. Guidelines for the development of technical specifications for the creation of information security in automated systems.
7.Poryadok of certification of technical means of information protection purpose.
8.ND 1.4.-001-2000. Model provision of security services in an automated system.
9.Tymchasove provision katehoriyuvannya objects (TPKO - 95).
10.ND 2.7.- Heat 001-99. Technical information security on program-controlled PBX public. The order of performance.
11.ND 3.6.-001-2000. Technical protection. Computer systems. The establishment, implementation, maintenance and modernization of the mechanical means of protecting information from unauthorized access.
12.ND 3.7.- Heat 002-99. Technical information security on program-controlled PBX public. Methods of assessing information security (basic).
13.ND 4.7.- 002-2001. Definition voice information security leaks acoustic and vibroacoustic channels.
2.DSTU 3396.1-96. Data protection. Technical protection. The order of operations.
3.ND 1.1.a 002-99. General information protection in computer systems from unauthorized access.
4.ND Heat 004-99. Criteria for evaluating information security in computer systems from unauthorized access.
5.ND Heat 005-99. Classification of automated systems and standard functional profiles processed information protection from unauthorized access.
6.ND Heat 001-99. Guidelines for the development of technical specifications for the creation of information security in automated systems.
7.Poryadok of certification of technical means of information protection purpose.
8.ND 1.4.-001-2000. Model provision of security services in an automated system.
9.Tymchasove provision katehoriyuvannya objects (TPKO - 95).
10.ND 2.7.- Heat 001-99. Technical information security on program-controlled PBX public. The order of performance.
11.ND 3.6.-001-2000. Technical protection. Computer systems. The establishment, implementation, maintenance and modernization of the mechanical means of protecting information from unauthorized access.
12.ND 3.7.- Heat 002-99. Technical information security on program-controlled PBX public. Methods of assessing information security (basic).
13.ND 4.7.- 002-2001. Definition voice information security leaks acoustic and vibroacoustic channels.
Assessment methods and criteria:
Diagnosis is made through knowledge test examinations on lectures and workshops, as well as protection course project.