Introduction to Information Security



Download 1,39 Mb.
bet1/44
Sana01.04.2022
Hajmi1,39 Mb.
#522548
  1   2   3   4   5   6   7   8   9   ...   44
Bog'liq
CSS

Computer Systems Security 1 Organisational lecture

Course objective

  • Gaining knowledge of the information security area
  • Gaining knowledge of the information protection technology
  • Information systems protections choice skills

Learning outcomes in terms of knowledge

  • Has detailed theoretically underpinned knowledge from the area of information security
  • Has detailed ordered theoretical knowledge about the security issues used in information protection domain

Learning outcomes in terms of skills

  • Can prepare critical analysis of the certain information protection issues set and rate their usefulness

Learning outcomes in terms of social competence

  • Understands the need of the supplementing and expanding knowledge about the issues used to protect information

Course content (1)

  • An introduction to information security
  • Cryptology, block ciphering, block ciphers working modes
  • Cascade ciphers, modern cryptographic algorithms
  • Public key cryptography

Course content (2)

  • Key establishment, management, and certification
  • Digital signature and electronic signature
  • Data security
  • Operation systems security hardening
  • Communication protection

Course content (3)

  • Protections against data loss or break
  • Malicious software and protections against it
  • Information systems security audit
  • Communication threats, email protection
  • Cryptographic protocols for mobile
  • Introduction to cryptanalysis

Assesment methods and criteria

  • Exam
  • Classes assessment
  • Project
  • Passing threshold 51%

Required textbooks

  • Handbook of Applied Cryptography.//Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone
  • Computer System Security: Basic Concepts and Solved Exercises (Computer and Communiaction Sciences)” by Gildas Avoine and Philippe Oechslin
  • Penetration Testing: A Hands-On Introduction to Hacking, Georgia

  • Download 1,39 Mb.

    Do'stlaringiz bilan baham:
  1   2   3   4   5   6   7   8   9   ...   44




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish