SylabUZ
Nazwa przedmiotu | Security of IT Systems |
Kod przedmiotu | 11.3-WK-CSEEP-SITS-S22 |
Wydział | Wydział Matematyki, Informatyki i Ekonometrii |
Kierunek | Computer science and econometrics |
Profil | ogólnoakademicki |
Rodzaj studiów | pierwszego stopnia z tyt. licencjata |
Semestr rozpoczęcia | semestr zimowy 2022/2023 |
Semestr | 6 |
Liczba punktów ECTS do zdobycia | 5 |
Występuje w specjalnościach | Information systems |
Typ przedmiotu | obieralny |
Język nauczania | angielski |
Sylabus opracował |
|
Forma zajęć | Liczba godzin w semestrze (stacjonarne) | Liczba godzin w tygodniu (stacjonarne) | Liczba godzin w semestrze (niestacjonarne) | Liczba godzin w tygodniu (niestacjonarne) | Forma zaliczenia |
Wykład | 30 | 2 | - | - | Egzamin |
Laboratorium | 30 | 2 | - | - | Zaliczenie na ocenę |
To acquaint the Students with selected elements of Information Security in the context of formal, legal and technical conditions of Cybersecurity
Information technology and computer protocols and networks.
lecture
1 .The basic informations about data safety, security and cybersecurity (2 hours)
2. The law about the protection of personal data other cybersecurity guidelinesand (2 hours)
3. Attributes and threats of IT systems: confidentiality, integrity, availability. (4 hours)
4. Models and classes of security for information systems. (2 hours)
5. Cryptography and crypto-analysis. (6 hours)
6. The telecommunications Law and the Digital Signature Act. (2 hours)
7. Authentication models and access control strategies. (2 hours)
8. Viruses, Trojans, Rotkits ... - methods of defense. (2 hours)
9. Increased security environments and utility services. (2 hours)
10. Local and network attacks - systems of attack detection and protection. (2 hours)
11. Introduction to defining security policy. (2 hours)
12. Security of BlockChain technology (2 hours)
Laboratory
1. Operating system - data protection functions. (2 hours.)
2. Configuring operating system user accounts. (2 hours.)
3. Advanced operating system services. (2 hours.)
4. Cryptographic tools in securing user data and accounts. (2 hours.).
5. ACL and VPN - configuring "remote work" tools and resource control. (4 hours).
6. Improving the efficiency of encryption and crypto-analysis methods - examples (4 hours)
7. "Buffer overflow" effects and countermeasures. (2 hours.)
8. Protection against "SQL Injection", "spoofing" and phishing. (2 hours.)
9. Counteracting "port scanning" and network activity control. (2 hours.)
10. Installation and configuration of anti-virus programs. (2 hours.).
11. Defining the security policy. (2 hours.)
12. Installing and using certificates - examples of use (2 hours)
13. Passive and active network security systems. (2 hours.)
Lecture with the use of presentation techniques, laboratory exercises, presentations of students' studies, a talk.
Opis efektu | Symbole efektów | Metody weryfikacji | Forma zajęć |
The final grade in the subject includes the laboratory grade (50%) and the exam grade (50%), assuming that the student has achieved all the assumed learning outcomes sufficiently. The condition for passing the course is obtaining a positive grade from the lecture and laboratory.
Zmodyfikowane przez dr inż. Paweł Wolański (ostatnia modyfikacja: 26-03-2024 15:04)