Technical Means of Biomedical Information Protection

Major: Biomedical Engineering (Internet of Things)
Code of subject: 6.163.03.O.035
Credits: 5.00
Department: Electronics and Information Technology
Lecturer: Docent Viktor V. Hoblyk
Semester: 5 семестр
Mode of study: денна
Мета вивчення дисципліни: Mastering by students the physical foundations of the construction of technical means of protecting biomedical information from its unauthorized leakage, studying the peculiarities of the emergence of information transmission channels bypassing current legislation and methods of protecting information from its destruction in information transmission channels and means of its storage from the action of intentional interference; familiarization with cryptographic methods of information protection.
Завдання: Integral competence: The ability to solve complex specialized tasks and practical problems in biomedical engineering and the Internet of Things or in the learning process, which involves the application of certain theories and methods of chemical, biological and medical engineering, and is characterized by the complexity and uncertainty of conditions. General competences: ZK1.Ability to apply knowledge in practical situations. ZK2.Knowledge and understanding of the subject area and understanding of professional activity. ZK4. Skills in using information and communication technologies. ZK5. Ability to conduct research at an appropriate level. ZK6. Ability to search, process and analyze information from various sources. Professional competences: FK1. Ability to apply engineering software packages for research, analysis, processing and presentation of results, as well as for automated design of medical devices and systems. FK3. Ability to learn and apply new methods and tools for analysis, modeling, design and optimization of medical devices and systems.
Learning outcomes: PRN5. Be able to use databases, mathematical and software for data processing and computer modeling of biotechnical systems, including telemedicine devices and the Internet of Things. ЗН12. Knowledge of engineering calculation methods. ЗН17. Understanding the peculiarities of operation of diagnostic and therapeutic systems, processing of diagnostic information. UM22. Ability to synthesize biomedical information systems. AB3. Ability to further study with a high level of autonomy.
Required prior and related subjects: • Informatics in biomedical engineering, part 1, 2. • Physics, part 1, 2. • Fundamentals of information theory and information systems • Biomedical information processing methods.
Summary of the subject: The course covers a wide range of issues related to the physical foundations of the construction of technical means of protecting biomedical information against its unauthorized leakage, the study of the peculiarities of the emergence of biomedical information transmission channels bypassing current legislation, and methods of protecting biomedical information from its destruction in information transmission channels and means of its storage from intentional interference. The subject of the study of the discipline is information security, a wide variety of information signals, methods and means of their distribution in space and time, processing, encoding and decoding of information flows, features of the development and construction of shielded premises to protect biomedical information from unauthorized leakage.
Опис: Regulatory and legal framework of Ukraine regarding information security and information protection. Information threats. Ways and methods of unauthorized access to information. Types of information protection. Peculiarities of biomedical information as an object of protection. Cryptographic protection of information. Basic concepts and definitions of cryptology. Cryptoanalytical attacks. Classical cryptosystems. Substitution codes. Permutation ciphers. Asymmetric cryptosystems. Identification, authentication, authorized access. Biometric identification of a person. Cryptographic protocols. The difference between cryptographic protocols and cryptographic systems. Information security of computer networks. Blockchain technology as a tool for protecting information in computer networks. HTTPS protocol. VPN technology. Multifunctional means of protection of IR networks. Protection of software in information systems. Characteristics of information leakage channels. Overview of technical means of information removal. Protection of information in telecommunication channels, optical and acoustic channels. Market analysis of technical information protection systems. Engineering systems and complexes of information protection.
Assessment methods and criteria: • Checking the performance of practical works; • checking tasks for independent performance on the topics of practical works; • verification of reports for practical work; • oral survey; • checking the control examination work of the work. • Performance of practical work, design and protection of reports. Preparation of an abstract-report (50 points). • Exam control work (50 points)
Критерії оцінювання результатів навчання: • Performance of practical work, design and protection of reports. Preparation of an abstract-report (50 points). • Exam control work (50 points)
Порядок та критерії виставляння балів та оцінок: 100–88 points – (“excellent”) is awarded for a high level of knowledge (some inaccuracies are allowed) of the educational material of the component contained in the main and additional recommended literary sources, the ability to analyze the phenomena being studied in their interrelationship and development, clearly, succinctly, logically, consistently answer the questions, the ability to apply theoretical provisions when solving practical problems; 87–71 points – (“good”) is awarded for a generally correct understanding of the educational material of the component, including calculations, reasoned answers to the questions posed, which, however, contain certain (insignificant) shortcomings, for the ability to apply theoretical provisions when solving practical tasks; 70 – 50 points – (“satisfactory”) awarded for weak knowledge of the component’s educational material, inaccurate or poorly reasoned answers, with a violation of the sequence of presentation, for weak application of theoretical provisions when solving practical problems; 49-26 points - ("not certified" with the possibility of retaking the semester control) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to apply theoretical provisions when solving practical problems; 25-00 points - ("unsatisfactory" with mandatory re-study) is awarded for ignorance of a significant part of the educational material of the component, significant errors in answering questions, inability to navigate when solving practical problems, ignorance of the main fundamental provisions.
Recommended books: 1. Information security: education. manual /Y.Ya. Bobalo, I.V. Gorbaty, M.D. Kiselichnyk, A.P. Bondarev, S.S. Voytusyk, A.Ya. Horpenyuk, O.A. Nemkova, I.M. Zhuravel, B.M. Berezyuk, E.I. Yakovenko, V.I. Otenko, I. Ya. Tyshyk; in general ed. Dr. Tech. Sciences, Prof. Yu. Ya. Bobala and Dr. Tech. of Science, Assoc. I. V. Gorbaty. - Lviv: Publishing House of Lviv Polytechnic, 2019. - 580 p. 2. Hoblyk N.M. MATLAB in engineering calculations. Computer workshop: training. manual / N.M. Hoblyk, V.V. Hoblyk. - Lviv. – Lviv: Publishing House of Lviv Polytechnic, 2020. – 191 p. 3. Law of Ukraine "On Information". Access mode: https://zakon.rada.gov.ua/laws/show/2657-12#Text 4. Law of Ukraine "On Protection of Personal Data". Access mode: https://zakon.rada.gov.ua/laws/show/2297-17#Text 5. Law of Ukraine "On information protection in information and telecommunication systems" Access mode: On information protection in inf... | dated 07/05/1994 No. 80/94-VR (rada.gov.ua) 6. Lenkov S.V. Methods and means of information protection. In 2 volumes/Lenkov S.V., Peregudov D.A., Khoroshko V.A. Ed. V.A. Khoroshko. - K.: Ary, 2008. - Volume I. Unauthorized obtaining of information. -464 pp., illustrations 7. Lenkov S.V. Methods and means of information protection. In 2 volumes/Lenkov S.V., Peregudov D.A., Khoroshko V.A. Ed. V.A. Khoroshko. - K.: Ary, 2008. - Volume II. Information security. - 344 pp., illustrations. 8. Basics of information security: education. Manual / V. A. Luzhetskyi, O. P. Voynovich, A. D. Kozhukhivskyi, L. I. Severin, I.B. Tregubenko. - Cherkasy, ChDTU, 2008. - 243 p. 9. Fundamentals of information security: учебн. Help For universities / E.B. Belov, V.P. Los, R.V. Meshcheryakov, A.A. Shelupanov - M.: Hotline - Telecom, 2006. - 544 p. 10. Horbenko I.D. // Applied cryptology: Theory. Practice, Application / I.D. Horbenko, Yu. I. Horbenko. - Kharkiv: Fort. 2013. – 880 p.
Уніфікований додаток: Lviv Polytechnic National University ensures the realization of the right of persons with disabilities to obtain higher education. Inclusive educational services are provided by the Service of accessibility to learning opportunities "Without restrictions", the purpose of which is to provide permanent individual support for the educational process of students with disabilities and chronic diseases. An important tool for the implementation of the inclusive educational policy at the University is the Program for improving the qualifications of scientific and pedagogical workers and educational and support staff in the field of social inclusion and inclusive education. Contact at: St. Karpinsky, 2/4, 1st floor, room 112 E-mail: nolimits@lpnu.ua Websites: https://lpnu.ua/nolimits https://lpnu.ua/integration
Академічна доброчесність: The policy regarding the academic integrity of the participants of the educational process is formed on the basis of compliance with the principles of academic integrity, taking into account the norms "Regulations on academic integrity at the Lviv Polytechnic National University" (approved by the academic council of the university on June 20, 2017, protocol No. 35).