Information System Security
Back
Course informations
Study program level |
Undergraduate |
Study program |
Electrical Engineering |
Study program direction |
Telecommunications and informatics |
Course year |
3. |
Course semester |
VI |
Course status |
Core |
ECTS |
6 |
Lectures (h) |
30 |
Excercises (h) |
30 |
Seminars (h) |
- |
Course objectives
Upon completion of this course, the student will be able to actively participate in the discussions on the contemporary aspects of information security of today. In addition, they will be able to keep track of future information security trends and implement existing systems and methods of protection in real-world business requirements and environments
Course outcomes
- Identify malware attacks and apply defense measures.
- Describe concepts and formal methods of access control.
- Describe the types and applications of cryptographic algorithms.
- Understand the notion and ways to identity verification.
- Understand access control methods.
- Apply a firewall in the role of protecting the network.
- Describe the most common attacks on web application security.
Course content
Basic principles of information security. Introduction to cryptography. Cryptographic algorithms: symmetric key algorithms, asymmetric key algorithms, and keyless algorithms. Methods of authentication and authorization. Authentication and security protocols. Malicious programs. Security and vulnerability of software. Security and methods of operating system protection. Ethical hacking, detecting and preventing invasions. Security of databases and web applications. Security of electronic business on the Internet. The basics of network security. Risk management, business process continuity, and "Disaster recovery". Legal aspects of information security.