SylabUZ

Generate PDF for this page

Security of IT Systems - course description

General information
Course name Security of IT Systems
Course ID 11.3-WK-MATP-BSI-W-S14_pNadGenVYT50
Faculty Faculty of Mathematics, Computer Science and Econometrics
Field of study Mathematics
Education profile academic
Level of studies First-cycle studies leading to Bachelor's degree
Beginning semester winter term 2019/2020
Course information
Semester 6
ECTS credits to win 5
Course type optional
Teaching language polish
Author of syllabus
  • dr inż. Janusz Jabłoński
Classes forms
The class form Hours per semester (full-time) Hours per week (full-time) Hours per semester (part-time) Hours per week (part-time) Form of assignment
Lecture 30 2 - - Exam
Laboratory 30 2 - - Credit with grade

Aim of the course

The student be becomes introduced in problems of protection of data and the computer systems as well as method of solving these problems.

Prerequisites

Computers system projecting and programming. Computer Nets.

Scope

Lecture
1. Legal conditioning of safety and security. (2h)
2. The acts about protection of data as well as the personal data protection. (2h)
3.The danger of computer systems: confidentiality, integrality accessibility. (4h)
4. The models and the class of safety for computer systems. (2h)
5. Cryptology as cryptography and crypt-analysis. (6h)
6. Telecommunicational law and act about digital signature. (2h)
7. The models of authenticating and the strategies of ACL. (2h)
8. Viruses, trojany, rotkity - the method of defence. (2h)
9. Environment about raised safety and tool services. (2h)
10. Incidents and attacks - the systems of detecting as well as the protection. (2h)
11. Defining the policy of safety. (2h)
12. The Public Key Infrastructure and the electronic signature. (2h)
 

Laboratory
1. The operating system - the functions in range of protection of data (2h)
2. Operating system and configuration the accounts of users (2h)
3. Advanced services of operating system (2h)
4. Cryptographical tools in protecting data and users accounts (2h)
5. ACL and VPN - the tools configuration to " the work remote" and the access control (2h)
6. Improvement of coding efficiency - the examples (2h)
7. "Buffer overflow" - results and counteraction (2h)
8. Protection before: "SQL Injection", "Phishing", ... (2h)
9. The "Port-knocking" counteraction as well as the control of activity in net (4h)
10. Antivirus - installation and the configuration (4h)
11. Defining the policy of safety (2h)
12 Certificates - the examples of installing and the use (2h)
13. Passive and active systems of network protections (2h)

Teaching methods

The lecture with multimedia presentations, talk, the students' studies, laboratory practice, discussion.

Learning outcomes and methods of theirs verification

Outcome description Outcome symbols Methods of verification The class form

Assignment conditions

Lecture: Written examination use to verifying the education outcome in area of knowledge and skills.
Laboratory: Final grade is granted based on receipt for: written tests, activity, completed project and documentation.
Final course grade consists of laboratory (50%) and examination (50%) by presumption, that student obtained all the founded effects of education in sufficient degree.

Recommended reading

1. J. Pieprzyk, T. Hardjono, J. Seberry, Teoria bezpieczeństwa systemówomputerowych, Helion, Gliwice 2005.
2. A. Lukatsky, Wykrywanie włamań i aktywna ochrona danych, Helion, Gliwice 2004.
3. A. Białas, Bezpieczeństwo informacji i usług w nowoczesnej instytucji i firmie, WNT, Warszawa 2006.
4. W. Stallings, Computer Security: Principles and Practice, Prentice Hall; 2011

Further reading

1. E. Cole, R.L. Krutz, J. Conley, Bezpieczeństwo sieci, Helion, Gliwice 2005.
2. R. Anderson, Inżynieria zabezpieczeń, WNT Warszawa 2005
3. M. Sokół, R. Sokół, Internet. Jak surfować bezpiecznie, Helion Łódz 2005
4. D.E. Denning, Wojna informacyjna i bezpieczeństwo informacji, WNT Warszawa 2002

Notes


Modified by dr Alina Szelecka (last modification: 03-07-2019 12:06)