Lesson Code | Course Name | Class | Credit | Lesson Time | Weekly Lesson Hours (Theoretical) | Weekly Lesson Hours (Practice) | Weekly Class Hours (Laboratory) |
---|---|---|---|---|---|---|---|
YSBG 3216 | Information Security in Management Systems | Үшінші курс | 5 | 150 | 1 | 2 | 2 |
The subject examines information security, threat analysis, principles of information protection in management systems, information security standards and characteristics, legislative, administrative, procedural levels of information security, technical means and methods of information protection, and as a result creates models of software and hardware systems of information security. Creates identification and authentication, encryption, integrity monitoring, computer network security, operating systems protection systems.
SCADA - Human Machine Systems
Computer networks in control systems
Narrative, exchange of ideas, discussion, problem methods.
1 | Knowledge of the basics of information security. |
2 | Knowledge of external / internal threats. |
3 | Learning ways and methods of information protection. |
4 | Ability to identify unauthorized access (NSD). |
5 | Knowledge of information protection levels. |
6 | Description / selection of network OSI model. |
7 | Selection / use of methods of administrative level protection of information security. |
8 | Selection / use of methods of procedural level protection of information security. |
9 | Selection / use of legal protection methods of information security. |
10 | Selection / use of methods of protection of information security at the technical level. |
Haftalık Konu | Evaluation Method | |
---|---|---|
1 | Basics of information security: concepts, problems, threats, protection methods. | |
2 | OSI Open Systems Model. | |
3 | External threats (virus / hacker attack / sabotage) and internal threats (information theft / employee irresponsibility). | |
4 | Protection methods (access control / antivirus software / firewall / antispam / VPN / data loss protection). | |
5 | Object-oriented method: basic concepts. | |
6 | Principles of object-oriented method (OBM). | |
7 | Legal level of information security. | |
8 | Information security standards and specifications. | |
9 | Administrative level of information security. | |
10 | Procedural level of information security. | |
11 | Program-technical level of information security: services. | |
12 | Program-technical level of information security: Information security system architecture. | |
13 | Cryptographic protection of information. | |
14 | Symmetric cryptosystem: one key. | |
15 | Asymmetric crypto-system: two keys - public / private key. |
PÇ1 | PÇ2 | PÇ3 | PÇ4 | PÇ5 | PÇ6 | PÇ7 | PÇ8 | PÇ9 | PÇ10 | PÇ11 | PÇ12 |
---|
Textbook / Material / Recommended Resources | ||
---|---|---|
1 | Макаренко С.И. Информационная безопасность: учеб. пособие / Ставрополь, 2009. – 372 с.: ил. | |
2 | Олифер В.Г. Компьютерные сети. Принципы, технологии, протоколы: учебник для вузов / С-Петербург : Питер, 2006. — 958 с. | |
3 | Титаев, А.А. Промышленные сети : учеб. пособие / Екатеринбург: Изд-во Урал. ун-та, 2020. - 124 с. | |
4 | Старостин А. А. Технические средства автоматизации и управления: учеб. пособие - Екатеринбург, 2015 – 168 с. |