Information security
Course: Mathematical Methods of Artificial Intelligence
Structural unit: Faculty of Computer Science and Cybernetics
Title
Information security
Code
ННД.04
Module type
Обов’язкова дисципліна для ОП
Educational cycle
Second
Year of study when the component is delivered
2023/2024
Semester/trimester when the component is delivered
1 Semester
Number of ECTS credits allocated
5
Learning outcomes
PLO8. Analyze the features of the use of modern quantum technologies to provide solutions to problems, including confidential communication, quantum cryptography, to conduct research on theoretical and experimental aspects of quantum informatics.
PLO11. Be able to analyze risks taking into account corporate values and interests, develop a risk management plan to determine the necessary preventive measures, apply actions to mitigate the consequences of risks and unforeseen actions.
Form of study
Prerequisites and co-requisites
To successfully learn the discipline «Information security» the student's academic level must meet the following requirements:
tо know: basic components of information systems, foundations of algebra, probability theory and number theory. Level B1 technical English skills;
be able to: develop, analyze and apply software systems to solve problems and applied tasks using modern software development methods.
Course content
Provides professional development for graduate students, aimed at forming the theoretical foundations and practical skills of information systems security, research and use of cryptographic algorithms and protocols to achieve information security goals.
The discipline belongs to the list of obligatory academic disciplines. The course is taught in the first semester. It includes 2 semantic parts and a colloquium. The discipline ends with an exam.
Recommended or required reading and other learning resources/tools
1. H.Bidgoli (Ed.) Handbook of Information Security, Volume 1. JohnWiley&SonsInc., 2006.
2. H.Bidgoli (Ed.) Handbook of Information Security, Volume 2. JohnWiley&SonsInc., 2006.
3. H.Bidgoli (Ed.) Handbook of Information Security, Volume 3. JohnWiley&SonsInc., 2006.
4. N.Smart Cryptography made simple. Springer, 2016.
5. O.Verbіtskii Vstup do kriptologії. VNTL, 1998.
6. J.-P.Aumasson Serious cryptography. No starch press, 2018.
7. J. Katz, Y. Lindell Introduction to modern cryptography. CRC Press, 2015.
8. A. Narayanan, J. Bonneau, Ed. Felten, A. Miller, S. Goldfeder Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, 2016.
9. C. Paar, J. Pelzl Understanding cryptography. Springer, 2010.
Planned learning activities and teaching methods
Lectures, labs, individual work.
Assessment methods and criteria
Assessment during the semester:
The maximum number of available points is 60.
Colloquium – 15/9 points.
Labs – 45/27 points.
Final assessment in the exam form:
The maximum number of available points is 40.
Form in which exam is taking: written work.
Types of tasks: 2 practical tasks and 1 theoretical task.
Colloquium and exam tasks correspond to lectures and labs topics.
Tasks of tests correspond to the practical classes’ content of the according part.
Language of instruction
Ukrainian language
Lecturers
This discipline is taught by the following teachers
Departments
The following departments are involved in teaching the above discipline