Information Systems
Lesson Code Course Name Class Credit Lesson Time Weekly Lesson Hours (Theoretical) Weekly Lesson Hours (Practice) Weekly Class Hours (Laboratory)
AHHET 3208 Information Security Technologies Үшінші курс 6 180 1 3 2
Course Descriptions
Kazakh
Lecturer G. N. Kazbekova

The discipline includes the basic provisions on the means of protecting computer information with modern organizational,technical, algorithmic and other methods of protecting computer information used in modern cryptosystems, the most common types of ciphers and their methods of cryptanalysis, concepts of Information Integrity, cryptographic protocols, basic provisions on electronic signatures. The course develops skills in the use of cryptographic methods in organizing work on Information Protection

Business Analyst and IT project management  

Algorithms, Data Structures and programming

Group work, brainstorming, Case study method, group project work method.

1Can assess threats to the security of Information Systems.
2Accumulates security technologies.
3Applies 3-cryptographic algorithms to various problems.
4Able to assess the reliability of information.
5Can declare ways to protect information.
6Analyzes traditional symmetric cryptosystems.
7Uses structural and functional features of 7-hash functions.
8Shows the difference between Block 8 and route displacements.
9Classifies public key cryptosystems.
10Can highlight the main functions of an electronic digital signature.
Haftalık KonuEvaluation Method
1Fundamentals of Information Security General schemes of the process of ensuring security, technologies.
2Fundamentals of cryptography. Simple displacement and displacement. 'Scitala' substitution method encryption tables.
3Application of the magic square (Magic Square) met-hod.
4Application of the magic square (Magic Square) met-hod.
5Caesar encryption system. Caesar substitution affine system.
6Trisemus encryption table.Playfair's bigram cipher.
7Encryption methods with different substitutions. Route, block, vertical displacements.
8Cardano cryptographic encryption system, Simple replacement and Cardano grids.
9Gronsfeld cipher. Wijiner encryption system.
10Wheatstone's' double square ' cipher for double placement.
11Shannon-Fano methodology. Huffman cryptographic encryption algorithm.
12The concept of public key cryptosystems. DES (Data Encryption Standard). AES( Advanced Encryption Standard).
13Public key cryptosystems. Encryption and decryption of information using the RSA cryptosystem.
14Electronic digital signature technology. Authentication of documents.
15Electronic digital signature algorithm architecture. Key generation. Hash functions.
Relationship between the Curriculum and Learning Outcomes
PÇ1PÇ2PÇ3PÇ4PÇ5PÇ6PÇ7PÇ8PÇ9PÇ10PÇ11PÇ12
Textbook / Material / Recommended Resources
1Information Security and Information Protection. Training manual [text] / K. S. Duisebekova. - Almaty: Kazakh University, 2013.
2The basis of Information Systems. Educational and methodical complex [text]. - Almaty: Nur-Print, 2013.
3Applied cryptography.Training manual [text] / Musralieva Sh. zh. - A.: Kazakh University, 2013.
4Fundamentals of cryptography [ text] / K. A. Abdykalikov. - Almaty: Polygrafcombinat LLP, 2012.
5The basis of Information Systems. Educational and methodical complex [text]. - Almaty: Nur-Print, 2012.