• A
  • A
  • A
  • АБB
  • АБB
  • АБB
  • А
  • А
  • А
  • А
  • А
Обычная версия сайта
Бакалавриат 2022/2023

Основы информационной безопасности

Направление: 38.03.05. Бизнес-информатика
Когда читается: 3-й курс, 3, 4 модуль
Формат изучения: без онлайн-курса
Охват аудитории: для своего кампуса
Язык: русский
Кредиты: 4
Контактные часы: 40

Программа дисциплины

Аннотация

Basics of Information Security is an elective course for third-year undergraduate students taught in English. The course is about the basic principles of information security as a task to solve and the overview of most common means and methods for it. This includes procedural controls, cryptography and steganography as well as protection from malware or exploitation of technical means of illegal information gathering.
Цель освоения дисциплины

Цель освоения дисциплины

  • Formation of students' knowledge of the role of information security in the management of information processes
  • Formation of students' understanding of the variety of possible means and methods of providing security of information.
Планируемые результаты обучения

Планируемые результаты обучения

  • A student is able to compare different classes of means and methods of information security based on their aim and strong and weak sides
  • A student is able to describe the main classes of means and methods of information security
  • A student is able to describe the main classes of threats of information security and their sources
  • A student is able to describe the main concept of steganographic methods of information security
  • A student is able to describe the main sources of regulatory request for information security
  • A student is able to explain the approach to maintaining information security based on identifying the threats, evaluating their danger and addressing them accordingly.
  • A student is able to explain the main concept of cryptographic methods of information security
  • A student is able to explain the meaning of integrity, confidentiality and availability of information.
  • A student is able to give examples of cases when a legal user can implement steganographical means and methods of information security
  • A student is able to describe the main classes of information security violators (threat actors) and threat sources in general as well as their main features
  • A student is able to describe the main concept and approaches to the protection of information from malicious software
  • A student is able to describe the main concept of protecting information from the threat of illegal gathering with the use of technical means
  • A student is able to suggest a reasonable blueprint of providing information security for a given information object or business process
Содержание учебной дисциплины

Содержание учебной дисциплины

  • The Concept of Information Security
  • Information security methods and tools
  • Security controls
  • Cryptography
  • Steganography
  • Emission security
  • Cybersecurity controls
Элементы контроля

Элементы контроля

  • неблокирующий Presentation
  • неблокирующий Exam
    Exam is held online in MS Teams. Precise technical instructions are to be published in the team of the subject.
  • неблокирующий Essay
  • неблокирующий Extra activity
    Students aiming for 9 (A+) and 10 (A++) grades for the course may suggest an activity that they can perform as an extra effort in mastering the course. This activity is recommended to be discussed with the teacher beforehand. Such an activity mush meet the following requirements. 1) It must correspond with the course information and tasks. 2) It must demonstrate that the information and the student's expertise involved are mastered at the advanced level, notably exceeding the level of regular tasks requirements. 3) Its result must be a complete, finished object that can be used by other students, teachers, scientists or professionals.
Промежуточная аттестация

Промежуточная аттестация

  • 2022/2023 4th module
    0.35 * Essay + 0.3 * Exam + 0.15 * Presentation + 0.2 * Extra activity
Список литературы

Список литературы

Рекомендуемая основная литература

  • Awad, A. I., & Fairhurst, M. C. (2018). Information Security : Foundations, Technologies and Applications. London, United Kingdom: The Institution of Engineering and Technology. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsebk&AN=1805102
  • Axelrod, C. W., Bayuk, J. L., & Schutzer, D. (2009). Enterprise Information Security and Privacy. Boston: Artech House, Inc. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsebk&AN=285008
  • Cloud security and privacy, Mather, T., 2009
  • Computer security, Gollmann, D., 2006
  • Cyber security : an introduction for non-technical managers, Green, J. S., 2015
  • Cyber security : economic strategies and public policy alternatives, Gallaher, M. P., 2008
  • Cyber security and the UK's critical national infrastructure : a Chatham House report, Sept. 2011, Cornish, P., 2011
  • Cybersecurity and cyber-information sharing : legal and economic analyses, Morgan, J. M., 2015
  • Cybersecurity and cyberwar : what everyone needs to know, Singer, P. W., 2014
  • Cybersecurity law and regulation, Orji, U. J., 2012
  • Everyday cryptography : fundamental principles and applications, Martin, K. M., 2017
  • Financial cryptography and data security : FC 2010 workshops, RLCPS, WECSTR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010: revised selected papers, , 2010
  • Handbook of information security. Vol.2: Information warfare; social, legal, and international issues; and security foundations, , 2006
  • Handbook of information security. Vol.3: Threats, vulnerabilities, prevention, detection, and management, , 2006
  • Introduction to cryptography and network security, Forouzan, B. A., 2008
  • Introduction to cryptography, Buchmann, J., 2004
  • J.H. Silverman, Jill Pipher, Jeffrey Hoffstein. An Introduction to Mathematical Cryptography. Springer-Verlag New York 2008
  • Katz, J., & Lindell, Y. (2014). Introduction to Modern Cryptography (Vol. Second edition). Boca Raton, FL: Chapman and Hall/CRC. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=nlebk&AN=1766746
  • Multimedia security : watermarking, steganography, and forensics, , 2013
  • Padhye, S., Sahu, R. A., & Saraswat, V. (2018). Introduction to Cryptography. Boca Raton, FL: CRC Press. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsebk&AN=1769573
  • Protecting information : from classical error correction to quantum cryptography, Loepp, S., 2006
  • Singer, P. W. . (DE-588)131662260, (DE-627)609812491, (DE-576)31105563X. (2014). Cybersecurity and cyberwar what everyone needs to know Peter W. Singer and Allan Friedman. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edswao&AN=edswao.399723471

Рекомендуемая дополнительная литература

  • Critical approaches to security : an introduction to theories and methods, , 2013
  • Handbook of information security. Vol.1: Key concepts, infrastructure, standards, and protocols, , 2006
  • Information security management handbook. Vol.7, , 2014
  • Ștefănescu, C., Comănescu, L. E., Buhuși, C., & Bîlcan, G. A. (2019). Theoretical Approaches to Estimate the Information Security Risks. Academic Journal of Economic Studies, 5(3), 120–125. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=bsu&AN=138862162