Automation and Management
Lesson Code Course Name Class Credit Lesson Time Weekly Lesson Hours (Theoretical) Weekly Lesson Hours (Practice) Weekly Class Hours (Laboratory)
YSBG 3216 Information Security in Management Systems Үшінші курс 5 150 1 2 2
Course Descriptions
Kazakh
Kasymbekov Abbazbek Sugirovich

The subject examines information security, threat analysis, principles of information protection in management systems, information security standards and characteristics, legislative, administrative, procedural levels of information security, technical means and methods of information protection, and as a result creates models of software and hardware systems of information security. Creates identification and authentication, encryption, integrity monitoring, computer network security, operating systems protection systems.

SCADA - Human Machine Systems

Computer networks in control systems

Narrative, exchange of ideas, discussion, problem methods.

1Knowledge of the basics of information security.
2Knowledge of external / internal threats.
3Learning ways and methods of information protection.
4Ability to identify unauthorized access (NSD).
5Knowledge of information protection levels.
6Description / selection of network OSI model.
7Selection / use of methods of administrative level protection of information security.
8Selection / use of methods of procedural level protection of information security.
9Selection / use of legal protection methods of information security.
10Selection / use of methods of protection of information security at the technical level.
Haftalık KonuEvaluation Method
1Basics of information security: concepts, problems, threats, protection methods.
2OSI Open Systems Model.
3External threats (virus / hacker attack / sabotage) and internal threats (information theft / employee irresponsibility).
4Protection methods (access control / antivirus software / firewall / antispam / VPN / data loss protection).
5Object-oriented method: basic concepts.
6Principles of object-oriented method (OBM).
7Legal level of information security.
8Information security standards and specifications.
9Administrative level of information security.
10Procedural level of information security.
11Program-technical level of information security: services.
12Program-technical level of information security: Information security system architecture.
13Cryptographic protection of information.
14Symmetric cryptosystem: one key.
15Asymmetric crypto-system: two keys - public / private key.
Relationship between the Curriculum and Learning Outcomes
PÇ1PÇ2PÇ3PÇ4PÇ5PÇ6PÇ7PÇ8PÇ9PÇ10PÇ11PÇ12
Textbook / Material / Recommended Resources
1Макаренко С.И. Информационная безопасность: учеб. пособие / Ставрополь, 2009. – 372 с.: ил.
2Олифер В.Г. Компьютерные сети. Принципы, технологии, протоколы: учебник для вузов / С-Петербург : Питер, 2006. — 958 с.
3Титаев, А.А. Промышленные сети : учеб. пособие / Екатеринбург: Изд-во Урал. ун-та, 2020. - 124 с.
4Старостин А. А. Технические средства автоматизации и управления: учеб. пособие - Екатеринбург, 2015 – 168 с.