Information protection technologies and cyber security

Course: Computer science

Structural unit: Faculty of information Technology

Title
Information protection technologies and cyber security
Code
ОК 30
Module type
Обов’язкова дисципліна для ОП
Educational cycle
First
Year of study when the component is delivered
2022/2023
Semester/trimester when the component is delivered
8 Semester
Number of ECTS credits allocated
4
Learning outcomes
Use the methodology of system analysis of objects, processes and systems for the tasks of analysis, forecasting, management and design of dynamic processes in macroeconomic, technical, technological and financial objects. To understand the concept of information security, the principles of safe software design, to ensure the security of computer networks in conditions of incompleteness and uncertainty of source data.
Form of study
Full-time form
Prerequisites and co-requisites
Know: • basic concepts and categories, principles, approaches and methods of ensuring cyber security; • basic principles of functioning and development of cyber security systems. Have skills: • application of modern information technologies; • understanding and practical application of approaches to ensuring cyber security.
Course content
The discipline "Information protection technologies and cyber security" forms in students the theoretical knowledge and practical skills necessary to meet the needs of the industrial and banking spheres of Ukraine in specialists who are able to detect signs and actively counteract external cyber influence.
Recommended or required reading and other learning resources/tools
1. Buryachok, V. L. Fundamentals of the formation of the state cyber security system: monograph/ V. L. Buryachok.— K.: NAU, 2013— 432 p. 2. Hnatiuk, S. O. Cyberterrorism: history of development, modern trends and countermeasures / S. O. Hnatiuk// Information security.— 2013.— Vol. 19, No. 2.— P. 118–129. 3. The National Security and Defense Council of Ukraine: Ukraine-NATO expert consultations on cyber security issues [Electronic resource].— Access mode: http://www.rainbow.gov.ua/news/ 1076.html 4. Korchenko, O. G. State cyber security: characteristic features and problematic aspects / O. G. Korchenko, V. L. Buryachok, S. O. Hnatyuk // Information security.— 2013— Vol. 19, No. 1 .— P. 40–45. 5. Glossary of cyber security terms / In general. ed. O. V. Kopana, E. D. Skulisha — K.: VB "Avanpost-Prim", 2012.— 214 c.
Planned learning activities and teaching methods
Lectures, laboratory activities, individual work.
Assessment methods and criteria
Control is carried out according to the modular rating system. The course consists of 2 content modules. Content module 1 (ЗМ1) includes topics 1 - 2, topics 3 - 5 are included in content module 2 (ЗМ2). Admission to credit is the student's successful completion of laboratory tasks and writing of modular control papers for the 1st and 2nd meaningful modules (based on the materials of lecture and laboratory classes). The results of students' educational activities are evaluated on a 100-point scale. The recommended minimum for admission to the test is 48 points. The credit is estimated at 20 points. The credit score cannot be less than 12 points to receive an overall positive score for the course.
Language of instruction
Ukrainian

Lecturers

This discipline is taught by the following teachers

Departments

The following departments are involved in teaching the above discipline