Lesson Code | Course Name | Class | Credit | Lesson Time | Weekly Lesson Hours (Theoretical) | Weekly Lesson Hours (Practice) | Weekly Class Hours (Laboratory) |
---|---|---|---|---|---|---|---|
BDK 2278 | Program and data security discipline | Екінші курс | 4 | 120 | 15 | 30 |
The discipline teaches the organization of systems and networks, basic principles, terminology, OSI model, methods of connecting to the Internet: e-mail (E-mail); Usenet, TelNet, FTP technologies and electronic means of communication;issues of information and intellectual property protection. Teaches modern methods of Information Protection; Security models and their application; cryptography methods; security criteria of computer systems.
The method of project work, the method of improving professional skills.
1 | mathematical modeling of problems posed in professional activities |
2 | develops a program in programming environments (Android, C# ) with mathematical modeling of 2-problems |
3 | develops programs in programming environments (C++, Python) with mathematical modeling of problems posed in professional activities |
4 | develops 4-database systems |
5 | develops a mobile application with the development of database applications, security systems |
6 | develops a website in service |
Haftalık Konu | Evaluation Method | |
---|---|---|
1 | Conceptual foundations of Technical Information Protection. Basic information protection technologies. | |
2 | Requirements and recommendations for the protection of information processed by computer equipment | |
3 | Classification of technical channels of information leakage | |
4 | Classification of hazards and defense objects | |
5 | Basic and extended requirements and recommendations for defense in the formation | |
6 | Classification of technical channels of information leakage. Information signal and its characteristics | |
7 | Conceptual foundations of Technical Information Protection. Basic information protection technologies. | |
8 | Requirements and recommendations for the protection of information processed by computer equipment | |
9 | Information signal and its characteristics | |
10 | Architectural standards for information security | |
11 | International standard 'general criteria' | |
12 | Protective profiles created on the basis of 'general criteria' | |
13 | British Standard BS 7799 | |
14 | US federal standard FIPS 140-2 'security requirements for cryptographic modules' | |
15 | Artificial intelligence in expert systems |
PÇ1 | PÇ2 | PÇ3 | PÇ4 | PÇ5 | PÇ6 | PÇ7 | PÇ8 | PÇ9 | PÇ10 | PÇ11 | PÇ12 | PÇ13 | PÇ14 | PÇ15 |
---|
Textbook / Material / Recommended Resources | ||
---|---|---|
1 | Babash, A.V. Informatsiina bezpeka. Laboratory workshop: Navchalniy posibnik / A. V. Babakh, E. K. Baranova, E. N. Melnikov. - M.: Knorus, 2016 — - 136 | |
2 | Ganer, V. V. ystitutsina bezpeka: Navchalniy posibnik / V. V. Ganer. - RNN / D: Phoenix, 2017 — - 324 | |
3 | Gromov, Yu. Yu. Informatsiina bezpeka da zahist informatsiï: Navchalniy posibnik / Yu. Yu. Gromov, V. O. Drachov, O. G. Ivanova. - St. Oskol: TNT 2017,. - 384 P | |
4 | Efimova, L. L. Informatsiina bezpeka ditei. I. A. koscherga: monograph / L. L. E. Mova, S. A. Kocherga. - M.: nitki-pieces, 2016. - 239 p | |
5 | Additional: 5. Zapechnikov, S. V. Informatsiina bezpeka vidkritikh system. In 2 — x T. T. 1 — zagrozi, urazlivosty, Ataki I pidkhodi to zahistu / S. V. Zapechnikov, N. Miloslavska G.-M.: GLT 2017,. - 536 P |