Lesson Code | Course Name | Class | Credit | Lesson Time | Weekly Lesson Hours (Theoretical) | Weekly Lesson Hours (Practice) | Weekly Class Hours (Laboratory) |
---|---|---|---|---|---|---|---|
AHHET 3208 | Information Security Technologies | Үшінші курс | 6 | 180 | 1 | 3 | 2 |
The discipline includes the basic provisions on the means of protecting computer information with modern organizational,technical, algorithmic and other methods of protecting computer information used in modern cryptosystems, the most common types of ciphers and their methods of cryptanalysis, concepts of Information Integrity, cryptographic protocols, basic provisions on electronic signatures. The course develops skills in the use of cryptographic methods in organizing work on Information Protection
Business Analyst and IT project management
Algorithms, Data Structures and programming
Group work, brainstorming, Case study method, group project work method.
1 | Can assess threats to the security of Information Systems. |
2 | Accumulates security technologies. |
3 | Applies 3-cryptographic algorithms to various problems. |
4 | Able to assess the reliability of information. |
5 | Can declare ways to protect information. |
6 | Analyzes traditional symmetric cryptosystems. |
7 | Uses structural and functional features of 7-hash functions. |
8 | Shows the difference between Block 8 and route displacements. |
9 | Classifies public key cryptosystems. |
10 | Can highlight the main functions of an electronic digital signature. |
Haftalık Konu | Evaluation Method | |
---|---|---|
1 | Fundamentals of Information Security General schemes of the process of ensuring security, technologies. | |
2 | Fundamentals of cryptography. Simple displacement and displacement. 'Scitala' substitution method encryption tables. | |
3 | Application of the magic square (Magic Square) met-hod. | |
4 | Application of the magic square (Magic Square) met-hod. | |
5 | Caesar encryption system. Caesar substitution affine system. | |
6 | Trisemus encryption table.Playfair's bigram cipher. | |
7 | Encryption methods with different substitutions. Route, block, vertical displacements. | |
8 | Cardano cryptographic encryption system, Simple replacement and Cardano grids. | |
9 | Gronsfeld cipher. Wijiner encryption system. | |
10 | Wheatstone's' double square ' cipher for double placement. | |
11 | Shannon-Fano methodology. Huffman cryptographic encryption algorithm. | |
12 | The concept of public key cryptosystems. DES (Data Encryption Standard). AES( Advanced Encryption Standard). | |
13 | Public key cryptosystems. Encryption and decryption of information using the RSA cryptosystem. | |
14 | Electronic digital signature technology. Authentication of documents. | |
15 | Electronic digital signature algorithm architecture. Key generation. Hash functions. |
PÇ1 | PÇ2 | PÇ3 | PÇ4 | PÇ5 | PÇ6 | PÇ7 | PÇ8 | PÇ9 | PÇ10 | PÇ11 | PÇ12 |
---|
Textbook / Material / Recommended Resources | ||
---|---|---|
1 | Information Security and Information Protection. Training manual [text] / K. S. Duisebekova. - Almaty: Kazakh University, 2013. | |
2 | The basis of Information Systems. Educational and methodical complex [text]. - Almaty: Nur-Print, 2013. | |
3 | Applied cryptography.Training manual [text] / Musralieva Sh. zh. - A.: Kazakh University, 2013. | |
4 | Fundamentals of cryptography [ text] / K. A. Abdykalikov. - Almaty: Polygrafcombinat LLP, 2012. | |
5 | The basis of Information Systems. Educational and methodical complex [text]. - Almaty: Nur-Print, 2012. |