Ви переглядаєте архівну версію офіційного сайту НУЛП (2005-2020р.р.). Актуальна версія: https://lpnu.ua

Design of Information Security Subsystem (курсовий проект)

Major: Information and Communication Systems
Code of Subject: 6.126.02.E.118
Credits: 3
Department: Telecommunication
Lecturer: PhD., Assoc. Prof. Burachok R.A.
Semester: 6 семестр
Mode of Study: денна
Learning outcomes:
• To use basic knowledge of computer science and modern information systems and technologies, programming skills, technology of safe work in computer networks, methods of creating databases and Internet resources, technology for the development of algorithms and computer programs in high-level languages ??using object- oriented programming to solve the tasks of designing and using information systems and technologies.
• Apply the knowledge of fundamental and natural sciences, system analysis and simulation technologies, standard algorithms and discrete analysis in solving problems of designing and using information systems and technologies;
• Apply the knowledge of fundamental and natural sciences, system analysis and simulation technologies, standard algorithms and discrete analysis in solving problems of designing and using information systems and technologies;
• To use basic knowledge of computer science and modern information systems and technologies, programming skills, technology of safe work in computer networks, methods of creating databases and Internet resources, technology for the development of algorithms and computer programs in high-level languages ??using object- oriented programming to solve the tasks of designing and using information systems and technologies;
• Conduct systematic analysis of design objects and substantiate the choice of structure, algorithms and methods of information transfer in information systems and technologies;
• To argue the choice of software and hardware for the creation of information systems and technologies based on the analysis of their properties, designation and specifications, taking into account the requirements of the system and operating conditions; have skills of debugging and testing of software and technical means of information systems and technologies;
• Demonstrate knowledge of the state-of-the-art information technology technologies, practical skills in programming and use of applied and specialized computer systems and environments for the purpose of their implementation in professional activities;
• To substantiate the choice of the technical structure and to develop the corresponding software that is part of the information systems and technologies.

be able to:
- to program the distributed infocommunication systems of the client-server type;
- To create and program high-performance and fault-tolerant infocommunication systems (based on programming languages ??C #, Java, Erlang, etc.).
- apply mathematical methods, computer models, modeling languages ??and software tools for practical tasks in this specialty
- apply knowledge and understanding of information technology to solve the tasks of classification, development, deployment and operation of various information systems and their components;
- to calculate, design, construct, research, exploit and set up information systems for monitoring and management of various objects;
- to combine theory and practice, to develop a strategy of activity for solving tasks in the specialty taking into account universal values, social, state and production interests;
- Search for information, plan and perform relevant experimental research and apply research skills on a professional basis;

own / be able to demonstrate:
- Effective work both individually and in the team, to really evaluate the results and to reasonably defend the decisions made;
- solving the tasks in the field of IT projects, assessing the milestones and final results of the work, taking the appropriate decisions.
- development of models of data streams, repositories and data spaces, knowledge bases for intelligent information systems, using charting techniques and standards for the development of information systems;
- creation of models and decision-making algorithms on the basis of the use of intellectual software components, artificial neural networks, machine learning, evolutionary modeling, genetic algorithms and fuzzy logic;
- the development of functional environments using open systems, application programming interfaces, applications and applications with properties: expandability, scalability, interoperability, integrity and reliability;
- selection of the most effective software platform for implementation of the necessary information communication solution based on the criteria of efficiency / reliability;
- skills of parallel programming of distributed infocommunication platforms and cross-platform programmable systems;
- integration of heterogeneous technologies of system programming in a single software platform with the use of the DBMS;
- Formulation of new tasks and ideas in the field of intellectual information technologies, the choice of appropriate directions and appropriate methods for their solution;
- application of methods and means of modern information technologies for design, development and deployment of applied information systems in various fields;
- application of methods and means of modern information technologies for modeling, designing and developing information and communication systems, Web-oriented systems, smart systems, sensory systems, embedded systems, micro / nano-systems and their analogues;
- Deployment, administration and administration skills.
Required prior and related subjects:
Previous academic disciplines:
Algorithmization and programming;
Software platforms for information and communication systems;
Operating Systems;
System programming.

Associate and the following academic disciplines:
Distributed IR systems;
Designing a subsystem of information security.
Summary of the subject:
The discipline involves designing a subsystem of information security in accordance with individual options for counseling faculty.
Recommended Books:
1. Богуш В. Інформаційна безпека держави/ Володимир Богуш, Олександр Юдін,; Гол. ред. Ю. О. Шпак. -К.: "МК-Прес", 2005. -432 с.

2. Бондарь И. Проблемы информационной безопасности в условиях переходного общества // Персонал. - 2003. - № 8. - C. 47-48.

3. Борсуковский Ю. Подходы и решения : Информационная безопасность // Мир денег. - 2001. - № 5. - C. 41-42

4. Горбатюк О.М. Сучасний стан та проблеми інформаційної безпеки України на рубежі століть // Вісник Київського університету імені Т.Шевченка. - 1999. - Вип. 14: Міжнародні відносини. - C. 46-48

5. Гуцалюк М. Інформаційна безпека України: нові загрози // Бизнес и безопасность. - 2003. - № 5. - C. 2-3

6. Захаров Е. Информационная безопасность или опасность отставания?// Права людини. - 2000. - № 1 . - C. 3-5

7. Інформаційна безпека України: проблеми та шляхи їх вирішення // Національна безпека і оборона. - 2001. - № 1. - C. 60-69

8. Катренко А. Особливості інформаційної безпеки за міжнародними стандартами // Альманах економічної безпеки. - 1999. - № 2. - C. 15-17

9. Кормич Б. Інформаційна безпека: організаційно-правові основи: Навчальний посібник/ Борис Кормич,. -К.: Кондор, 2005. -382 с.

10. Литвиненко О. Інформація і безпека // Нова політика. - 1998. - № 1. - C. 47-49.

11. Маракова І. Захист інформації: Підручник для вищих навчальних закладів/ Ірина Маракова, Анатолій Рибак, Юрій Ямпольский,; Мін-во освіти і науки України, Одеський держ. політехнічний ун-т, Ін-т радіоелектроніки і телекомунікацій. -Одеса, 2001. -164 с.

12. Пилипенко О. Формула безопасности : Информационная безопасность// CHIP. - 2005. - № 12. - C. 72-73

13. Правове забезпечення інформаційної діяльності в Україні/ Володимир Горобцов, Андрій Колодюк, Борис Кормич та ін.; Ред. І. С. Чиж; Ін-т держави і права ім. В.М.Корецького, Нац. Академія Наук України, Держ. комітет телебачення і радіомовлення України. -К.: Юридична думка , 2006. -384 с.

14. Система забезпечення інформаційної безпеки України // Національна безпека і оборона. - 2001. - № 1. - C. 16-28

15. Щербина В. М. Інформаційне забезпечення економічної безпеки підприємств та установ // Актуальні проблеми економіки. - 2006. - № 10. - C. 220 - 225.
Assessment methods and criteria:
During the training, students conduct a workshop containing dozens of various practical-oriented tasks, the solution of which requires substantial theoretical training in accordance with this program. Evaluation of the results of laboratory work is provided as the main form of ongoing control. Blitz testing on laboratory lessons, performance of individual practical work is also foreseen. Evaluating the results of performing individual practical tasks through their protection allows students to be motivated to better study and obtain additional points. Semester control is carried out in the form of a score based on interviews, current and intermediate controls in laboratory classes.