Information and Communication Systems Security

Major: Information and Communication Systems
Code of subject: 6.126.02.E.91
Credits: 5.00
Department: Telecommunication
Lecturer: DSc., Assoc. Prof. Kyryk M.I.
Semester: 6 семестр
Mode of study: денна
Learning outcomes: Knowledge of types of information threats in information and communication systems Knowledge of the principles of confidentiality, integrity and availability of data; Understanding the tactics, methods and procedures used by cybercriminals; Knowledge of technologies used to protect privacy and to ensure data integrity and high availability; Knowledge of processes and procedures to protect all network components; Ability to identify attacks and their signs, apply network security countermeasures Skills and abilities in security management, control, protection and mitigation technology. Knowledge of technologies, software products, and procedures used to protect data privacy and develop security policies. Possession of the skills of administration of information systems and networks; Knowledge of the principles of maintenance and administration of network devices. Ability to perform security analysis of an information and communication system or network and eliminate possible ways of unauthorized access.
Required prior and related subjects: Basics of network technologies Integration and testing of information and communication systems Basics of information theory and coding Deployment of information and communication systems
Summary of the subject: Modern organizations face the difficult task of quickly identifying cyber security breaches and effectively responding to security events. Groups of people in security monitoring and control centers (SOCs) manage security systems and protect their organization by timely detecting and neutralizing cyber security threats. The discipline "Security of information and communication systems" aims to prepare students to start work as junior level cyber security analysts in security monitoring and management centers and to form in them the necessary competencies for work in the field.
Assessment methods and criteria: Running check: The defense of laboratory work is carried out in writing (in PDF format of a form that contains information about the student and 5 questions to which the student must answer), or in oral form in the format of a survey (the student, according to a pre-approved list of questions, answers any what five questions). Each question is valued at one point. As a result of the correct answer to all questions, the student receives 5 points. The sum of points is divided by a correction factor of 2.25. Examination control consists of two components: 1) written - - is made in writing in PDF format. The PDF form contains information about the student and 12 questions to which the student must provide answers. The first 5 questions are test questions with one correct answer and are valued at 3 points, the next 5 questions are test questions with two or more correct answers and are valued at 5 points, the last two questions require the correct answer and are valued at 5 points. 2) oral - conducted in the form of a survey, where the student answers any five questions according to a pre-approved list of questions. Each question is worth 2 points.
Recommended books: 1. Buryachok V. L. Information and cyberspace: security problems, methods and means of combat. [Manual]. / V. L. Buryachok, S. V. Tolyupa, V. V. Semko, L. V. Buryachok, N. V. P. M. Skladannyi. Lukova-Chuiko/ – K.: DUT - KNU, 2016. – 178 p. ISBN 978–617–7092–78–9. 2. Buryachok V.L., Tolyupa S.V., Anosov A.O., Kozachok V.A., Lukova-Chuiko N.V. System analysis and decision-making in information security: a textbook. / V.L. Buryachok, S.V. Tolyupa, A.O. Anosov, V.A. Kozachok, N.V. Lukova-Chuiko / - K.:DUT, 2015. - 345 p. 3. Bogush V.M., Kudin A.M. Information security from A to Z: 3000 terms and concepts. - K.: MOU, 1999. - 456 p. 4. Cisco systems. Educational materials of Cisco academies for the Cybersecurity Essentials course https://www.netacad.com/courses/cybersecurity/cybersecurity-essentials/ 5. Cisco systems. Cisco network academies training materials for the CCNA Cybersecurity Operations course https://www.netacad.com/courses/cybersecurity/cyberops-associate/ 6. Buryachok, V. L. Information and cyber security: socio-technical aspect: textbook / [V. L. Buryachok, V. B. Tolubko, V. O. Khoroshko, S. V. Tolyupa]; in general ed. Dr. Tech. of Sciences, by Professor V. B. Tolubka.— K.: DUT, 2015.— 288 p. 7. Fundamentals of cryptographic protection of information: textbook / H.M. Gulak, V.A. Mukhachov, V.O. Khoroshko, Yu.E. Yaremchuk = Vinnytsia: VNTU, 2011. – 199 p. ISBN 978-966-641-430-7. 8. Kuznetsov O.O. Protection of information in information systems: study. help./ O.O. Kuznetsov, S.P. Yevseev, O.G. Korol.-Kharkiv: Khneu, 2011.-512 p. 9. Buryachok V.L., Tolyupa S.V., Anosov A.O., Kozachok V.A., Lukova-Chuiko N.V. System analysis and decision-making in information security: a textbook. / V.L. Buryachok, S.V. Tolyupa, A.O. Anosov, V.A. Kozachok, N.V. Lukova-Chuiko / - K.:DUT, 2015. - 345 p. ISBN #978–966–2970–81–4.