• A
  • A
  • A
  • АБВ
  • АБВ
  • АБВ
  • А
  • А
  • А
  • А
  • А
Обычная версия сайта

Basics of Information Security

2021/2022
Учебный год
ENG
Обучение ведется на английском языке
4
Кредиты
Статус:
Курс по выбору
Когда читается:
3-й курс, 3, 4 модуль

Преподаватель

Course Syllabus

Abstract

Basics of Information Security is an elective course for third-year undergraduate students taught in English. The course is about the basic principles of information security as a task to solve and the overview of most common means and methods for it. This includes procedural controls, cryptography and steganography as well as protection from malware or exploitation of technical means of illegal information gathering.
Learning Objectives

Learning Objectives

  • Formation of students' knowledge of the role of information security in the management of information processes
  • Formation of students' understanding of the variety of possible means and methods of providing security of information.
Expected Learning Outcomes

Expected Learning Outcomes

  • A student is able to compare different classes of means and methods of information security based on their aim and strong and weak sides
  • A student is able to describe the main classes of means and methods of information security
  • A student is able to describe the main classes of threats of information security and their sources
  • A student is able to describe the main concept of steganographic methods of information security
  • A student is able to describe the main sources of regulatory request for information security
  • A student is able to explain the approach to maintaining information security based on identifying the threats, evaluating their danger and addressing them accordingly.
  • A student is able to explain the main concept of cryptographic methods of information security
  • A student is able to explain the meaning of integrity, confidentiality and availability of information.
  • A student is able to give examples of cases when a legal user can implement steganographical means and methods of information security
  • A student is able to describe the main classes of information security violators (threat actors) and threat sources in general as well as their main features
  • A student is able to describe the main concept and approaches to the protection of information from malicious software
  • A student is able to describe the main concept of protecting information from the threat of illegal gathering with the use of technical means
  • A student is able to suggest a reasonable blueprint of providing information security for a given information object or business process
Course Contents

Course Contents

  • The Concept of Information Security
  • Information security methods and tools
  • Security controls
  • Cryptography
  • Steganography
  • Emission security
  • Cybersecurity controls
Assessment Elements

Assessment Elements

  • non-blocking Exam
    Exam is held online in MS Teams. Precise technical instructions are to be published in the team of the subject.
  • non-blocking Presentation
  • non-blocking Essay
  • non-blocking Extra activity
    Students aiming for 9 (A+) and 10 (A++) grades for the course may suggest an activity that they can perform as an extra effort in mastering the course. This activity is recommended to be discussed with the teacher beforehand. Such an activity mush meet the following requirements. 1) It must correspond with the course information and tasks. 2) It must demonstrate that the information and the student's expertise involved are mastered at the advanced level, notably exceeding the level of regular tasks requirements. 3) Its result must be a complete, finished object that can be used by other students, teachers, scientists or professionals.
Interim Assessment

Interim Assessment

  • 2021/2022 4th module
    0.3 * Exam + 0.2 * Extra activity + 0.3 * Essay + 0.2 * Presentation
Bibliography

Bibliography

Recommended Core Bibliography

  • Awad, A. I., & Fairhurst, M. C. (2018). Information Security : Foundations, Technologies and Applications. London, United Kingdom: The Institution of Engineering and Technology. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsebk&AN=1805102
  • Axelrod, C. W., Bayuk, J. L., & Schutzer, D. (2009). Enterprise Information Security and Privacy. Boston: Artech House, Inc. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsebk&AN=285008
  • Cloud security and privacy, Mather, T., 2009
  • Computer security, Gollmann, D., 2006
  • Cyber security : an introduction for non-technical managers, Green, J. S., 2015
  • Cyber security : economic strategies and public policy alternatives, Gallaher, M. P., 2008
  • Cyber security and the UK's critical national infrastructure : a Chatham House report, Sept. 2011, Cornish, P., 2011
  • Cybersecurity and cyber-information sharing : legal and economic analyses, Morgan, J. M., 2015

Recommended Additional Bibliography

  • Critical approaches to security : an introduction to theories and methods, , 2013
  • Cybersecurity and cyberwar : what everyone needs to know, Singer, P. W., 2014
  • Information security management handbook. Vol.7, , 2014
  • Ștefănescu, C., Comănescu, L. E., Buhuși, C., & Bîlcan, G. A. (2019). Theoretical Approaches to Estimate the Information Security Risks. Academic Journal of Economic Studies, 5(3), 120–125. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=bsu&AN=138862162