«Approve» The Dean of the Faculty of Radio Engineering, Telecommunications and Communications Medeuov U year

Similar documents
Network Security

ITSY Information Technology Security Course Syllabus Spring 2018

Computer Science Technology Department

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

UNIT OUTLINE. Network Engineering 304. Mr Iain Murray. Department of Electrical and Computer Engineering Curtin Engineering

Computer Science Technology Department

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015

Standard Course Outline IS 656 Information Systems Security and Assurance

BEng (Hons) Civil Engineering E410 (Under Review)

San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM

BEng (Hons) Electronic and Communication Engineering - E431 (Under Review)

BSc (Honours) Computer Science Curriculum Outline

ISO Lead Auditor Program Risk Management System (RMS) Training Program

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

Cyber Security CYBER SECURITY

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.

San José State University Department of Computer Science CS-174, Server-side Web Programming, Section 2, Spring 2018

Department of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus

SYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS. Module 3E Windows Forensics 10 ECTS

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17

BEng (Hons) Chemical Engineering (Minor: Energy Engineering) E403 (Under Review)

Syllabus. 1. Program information. 2. Course information Instructors. 3. Total estimated time. 4. Prerequisites. Page 1/5

University of San Francisco Course Syllabus and Outline

FIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010

Software Reliability and Reusability CS614

Course Outline. CISSP - Certified Information Systems Security Professional

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Department of Computer Science

Computer Science Technology Department

ISO LEAD AUDITOR TRAINING

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

San José State University Department of Computer Science CS-144, Advanced C++ Programming, Section 1, Fall 2017

CompTIA Cybersecurity Analyst+

MGMT 4336 Networks & Data Communication Section D10

BSc (Hons) Software Engineering (FT) - IC320

10EC832: NETWORK SECURITY

ITSY 2330 Intrusion Detection Course Syllabus

CSc 2310 Principles of Programming (Java) Jyoti Islam

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

Cloud Security. Copyright Ramesh Nagappan. All rights reserved.

BEng (Hons) Mechanical Engineering - E440 (Under Review)

Washtenaw Community College Comprehensive Report. CNT 251 Designing Windows Server Security Effective Term: Fall 2012

Syllabus Revised 01/03/2018

COURSE SYLLABUS FOR COMP-162 COMPUTER CONCEPTS AND APPLICATIONS

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

Bachelor of Science in Business Administration - Information Systems and Technology Major

Academic Course Description

CSE111 Introduction to Computer Applications

Only the original curriculum in Danish language has legal validity in matters of discrepancy

San José State University Department of Computer Science CS158B, Computer Network Management, Section 1, Fall 2016

Academic Course Description

Graduate Certificate in Internet Business

MASTER OF DISASTER MANAGEMENT CURRICULUM

Part A: Course Outline

Curriculum for the Bachelor's Degree Programme in Web Development Institutional section

Instructor: Eric Rettke Phone: (every few days)

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

Course Syllabus: CompTIA Network+

SYLLABUS. 1. Information regarding the programme 1.1 Higher education Babeş-Bolyai University of Cluj-Napoca

NOTE: This syllabus is subject to change during the semester. Please check this syllabus on a regular basis for any updates.

Red Hat Certified Engineer (RH300) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

Syllabus Revised 08/21/17

CompTIA A Course Overview. Course Goals. Syllabus

Course specification

Syllabus: AIT Information Systems Infrastructure Lifecycle Management

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

SI - Computer Security

Cyber Security Program

Network Architecture I

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

Syllabus CSCI 405 Operating Systems Fall 2018

Digital Communication and Aesthetics,

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

Course Syllabus: CompTIA A+ Hardware

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

NOTE: This syllabus is subject to change during the semester. Please check this syllabus on a regular basis for any updates.

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

ESET 349 Microcontroller Architecture, Fall 2018

ASTON UNIVERSITY PROGRAMME SPECIFICATION

Module Documentation

San José State University Department of Computer Science CS 166 / SE 166, Information Security, Section 4, spring, 2017

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies

Computer Science Technology Department

CURRICULUM MASTER OF DISASTER MANAGEMENT

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0

Course specification

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

TREASURY BANKING OPERATIONS Certification Program

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS WINDOWS PROFESSIONAL CSIT 2700

ITT Technical Institute. NT2740 Advanced Networking Devices Onsite and Online Course SYLLABUS

Course Curriculum for Master Degree in Network Engineering and Security

The GenCyber Program. By Chris Ralph

Descriptions for CIS Classes (Fall 2017)

Transcription:

Ministry of Education and Science of the Republic of Kazakhstan Non-Profit JSC «Almaty University of Power Engineering and Telecommunications» Faculty of Radio Engineering, Telecommunications and Communications The department of Electronics and Robotics «Approve» The Dean of the Faculty of Radio Engineering, Telecommunications and Communications Medeuov U. 2017 year Syllabus Information security systems for the specialty «5B071600 Instrument construction» Year of study 4-rd Semester 7-th Number of credits 3 Total ECTS credits 6 Total hours 135 including: lectures 30 h practical classes 15 h Self-study assignments (SSA) 90 h including: self-study under the teacher s supervision (SSTUS) 30h Computation graphic work 3 Examination Almaty 2017

The Course Syllabus has been developed by T. V. Golubeva, senior teacher. The syllabus is based on the curriculum and the standard program of the discipline for the specialty «5B071600 Instrument construction» Work program was considered and approved at the meeting of department «Electronics and Robotics» from 20.06. 2017, Protocol 11. Head of Department Balbaev G.K. Work program was considered and approved at the meeting of an educational and methodical commission of the faculty Radio Engineering, Telecommunications and Communications (the protocol 8, from 23.06.2017). About teacher: Golubeva T. V., senior-teacher. Published 16 scientific articles and methodical works, scientific and pedagogical experience is 10 years. Laboratory classes according to the discipline are held in laboratory Б-329. Office: «Electronics and Robotics» department Address: 050013, Almaty, Baitursynov street, 126. AUPET

1 Teacher: Golubeva T. V. senior teacher of «Electronics and Robotics» department. Contacts: 8(727)2784683, tvgolubeva@mail.kz. 2 Time and place of classes are indicated in the schedule of training sessions, schedule of consultation is posted on the Dean's Office s and department s message boards. 3 Prerequisites: «Information», «Algorithmization and programming». 4 Post requisites: No requsites 5 Characteristics 5.1 The aim acquisition of fundamental knowledge about the basic principles of information security, as well as providing information security. Definitions of the main concepts are given: cryptography, privacy, integrity, autentification, digital signature. 5.2 Task to learn the main methods of modern means of information security in computer systems and networks. 5.3 Description The discipline is for students of specialty «5B071600 Instrument construction» and aims to acquaint students with the basics of security systems and learn methods of evaluating protecting information, as well as to acquaint with the means of information systems against data loss and the possibility of predicting the state of security systems. At the end of the course «Design of cooling devices CMD and system HEC» student must know: about legislative and regulatory framework in providing security in information systems; about the conditions and factors affecting their working capacity during the transmission of information; about monitoring procedures in the areas of security and protection of information in information systems; basic technologies of providing security in information systems and their possibilities; main methods of information security in information systems; be able to: provide security of information during the transmission; apply methods for choosing the best way to ensure the protection of information in information systems; organize and carry out examination according to the protection of information in information systems.

The Course content 6.1 Lectures Theme The number of source 1 Introduction. Basic concepts of software and hardware protection. (2 hours) 2 Analysis of often used threats and vulnerabilities protection. (2 hours) 3 Malicious software. (2 hours) 4 Antivirus programs. (2 hours) 5 Adware. Spyware. The protection from them. (2 hours) 6 Classification of firewalls. (2 hours) 7 Screening as a security service. (2 hours) 8 Tunneling and management as security service. (2 hours) 9 Administrative level of information security. The security policy. (2 hours) 10 Administrative level of information security. The program of security. (2 hours) 11 Purpose of hardware protection. Classification. Hardware protection of software. (2 hours) 12 Hardware protection of computer and information. Hardware protection of network firewalls. (2 hours) 13 Kerberos Authentication service. Identification/ authentication with the help if the biometrical data (2 hours) 14 The use of object-oriented approach to the protected systems. (2 hours) 15 Disadvantages of traditional approach to information security from the object viewpoint (2 hours)

6.2 List of practical classes Methodological recommendations for work execution can be found in printed form at «Electronics» department. It is necessary to use the basic and additional literature from the list in paragraph 10. Theme Source 1 Investigation of the operating system with the help of the utility AVZ. (4 hours) 2 Setting up the hardware firewall. Simulation of protection against network attacks with the help of Packet Tracer 5.0. Construction of access lists (4 hours) 3 Construction of the tunnel on the basis of Packet Tracer 5.0. Demonstration of model (4 hours) 4 Configuring Local Security Policy snap-in using "Group Policy" (4 hours) 6.3 Themes for computation graphic work (CGW) 1, 3, 5 1, 3, 5 1, 3, 5 1, 3, 5 Methodological recommendations for work execution can be found in printed form at «Electronics» department. It is necessary to use the basic and additional literature from the list in paragraph 10. Theme of CGW 1: Based on the known data about virus develop a manual treatment algorithm. Bring screenshots for used programs and commands. Theme of CGW 2: The network virus attack. Based on Packet Tracer 5.0 demonstrate method of attack detection and its blocking. Theme of CGW 3: The overload of local network elements and external channel of enterprise. Based on Packet Tracer 5.0 demonstrate the method of detecting internal attack, its localization and blocking. Carried out in accordance to the guidelines. Tasks are given during the first week of a semester. 6.4 Themes of Self-Study Activities (SSA) SSAs are held according to the themes of lectures, laboratory glasses and CGWs. 6.5 Exam questions 1. Object-oriented approach to information security facilities. 2. Application of the object oriented approach to the protected systems. 3. Disadvantages of the traditional approach to information security with the object point of view. 4. Active and passive subjects.

5. The criteria for the classification of threats. Security threats. 6. Security damage. 7. Classification of threats in relation to the supporting infrastructure. 8. The most common threats to availability. 9. The classification of the main sources of internal failures. 10.Malicious software. 11.Safe and secure system. 12.The main threats to the integrity. 13.Secure policy. 14.The attack on a computer system. 15.The main privacy threats. 16.Abuse of functions. 17.Kerberos authentication server. 18.The Administrative level of information security. 19.Security Program. 20.The main security threats. 21.The main goals of the security program. 22.Synchronization if security software with the lifecycle. 23.Identification / authentication using biometric data. 24.Masquerade. The concept and its use. 25.Interception of passwords and how to intercept passwords. 26.Trojan horse. Concept and its destructive functions. A number of measures that are necessary to protect a system. 27.Worm. Concept and its destructive functions. A number of measures that are necessary to protect a system. 28. Computer virus. Subfamily. A number of measures that are necessary to protect a system. 29. Screening as a security service. 30.Classification of firewalls. 31.Security analysis as security service. 32.Tunneling as security service. 33.The management, as a security service. 34.The concept of the proactive management. 35.The concept of trusted or delegated management. 36.Security of object reuse. 37.Limiting interface, as a kind of screening. 38.The separation of defense. 39.A two-component shielding with a demilitarized zone. 40.The concept of hardware and software protection. 6 Information on assessing the achievements of students 6.1 Evaluation system The level of the student's achievements in the course program is assessed on the scale of the final grades accepted in the credit technology of training (Table 1). Table 1 Alphabetic Points Percentage content Traditional

А 4,0 95-100 Excellent А- 3,67 90-94 Excellent В+ 3,33 85-89 Good В 3,0 80-84 Good В- 2,67 75-79 Good С+ 2,33 70-74 Satisfactorily С 2,0 65-69 Satisfactorily С- 1,67 60-64 Satisfactorily D+ 1,33 55-59 Satisfactorily 1,0 50-54 Satisfactorily F 0 0-49 Unsatisfactorily The rating of the access rating is accumulated during the semester. Each type of training is assessed on a 100-point scale and included in the tolerance rating, taking into account the weighting factor in accordance with Table 2. Table 2 - Tolerance rating. Significance of each type of work Parameter Weight coefficient Performance of laboratory workshop 0,4 Course work 0,4 Attending lectures 0,2 Total: average assessment of current controls (Ср) 1,0 The admission rating for the discipline (Rating) for bachelors and undergraduates is calculated by the PLATONUS program using the formula: Rating= Р1+Р2 0,2+Ср 0,8, 2 where Р1 - an estimation for the first boundary control; P2 - estimate for the second boundary control; Cp is the arithmetic average of all completed assignments from 1 to 15 weeks (performing CGW, laboratory and course work, etc. Each task is evaluated on a 100-point scale). The final grade for the discipline is calculated by the formula: The final grade = 0,6 Rating + 0,4 E, где E exam assessment. 6.2 Pointing Policy: The maximum scores are given on condition of rhythmic performance and high quality of work. Evaluation scores for testing and attending lecture classes are given depending on the number of correct answers and the number of missed lectures. 6.3 Translation of assessments in the organization of academic mobility of students The translation of the ECTS (European Transfer (Transfer) and Accumulation of Credits) ratings into a rating-rating letter system for assessing the educational achievements of students of the RK and back is carried out according to Tables 3 and 4. Table 3 - Conversion of ECTS scores to a point-rating alphabetic system for assessing the educational achievements of students of the RK Estimated by ECTS Alphabetic Digital equivalent Points Percentage content А А 4,0 100 Excellent В В+ 3,33 85 С В 3,0 80 Good D С 2,0 65 E D 1,0 50 Satisfactorily Traditional

FX, F F 0 0 Unsatisfactory Table 4 - Translation of scores of the pointsrating alphabetic system RK into the assessments by ECTS Digital Percentage Estimated by Alphabetic equivalent Traditional content ECTS Points А 4,0 95-100 А- 3,67 90-94 Excellent А В+ 3,33 85-89 Good В В 3,0 80-84 Good В- 2,67 75-79 С С+ 2,33 70-74 Satisfactorily С 2,0 65-69 С- 1,67 60-64 Satisfactorily D D+ 1,33 55-59 D 1,0 50-54 Satisfactorily E F 0 0-49 Unsatisfactory FX, F 7 Policy of the course: - do not be late and do not miss classes; - closely monitor the instructor's scenario, actively participating in it; - practice laboratory exercises missed for valid reasons (if there is an admission from the dean's office); - the course work for the defense to represent no later than the penultimate week of the semester: - self study in the library and at home. 8 Standards of academic ethics: - discipline; - good breeding; - benevolence; - honesty; - a responsibility; - work in the classroom with disabled cell phones. Conflict situations should be openly discussed in training groups with a teacher, an adviser, and if the conflict is not resolved, they should be brought to the dean's office. 9 Recommended books and materials Main: 1. Галатенко В.А. Основы информационной безопасности.-м.,2006 2. Основы информационной безопасности./под ред. Е.Б.Белов и др.- М.,2006 3. Малюк А.А. Информационная безопасность: Концептуальные и методологические основы защита информации.-м.,2006 4. Петраков А.В. Основы практической защиты информации.-м.,2007 5. Рябко Б.Я. Криптографические методы защиты информации.-м.,2007 6. Гордейчик С.В. Безопасность беспроводных сетей.-м.,2008 7. Соболев А.Н. Физические основы технических средств обеспечения информационной безопасности.-м.,2006 Additional: 1. Максим Мерритт Безопасность беспроводных сетей.-м.,2006 2. Партыка Т.П. Информационная безопасность.-м.,2008

3. Прохода А.Н. Обеспечение интернет- безопасности.-м.,2007 4. Информационная безопасность. Компьютерных систем и сетей.-м.,2008 5. Романов О.А. Организационное обеспечение информационной безопасности.-м.,2008 6. Смит Д.Дж. Функциональная безопасность.-м.,2006