Enterprise Cyber Security

Course: Network and internet technologies

Structural unit: Faculty of information Technology

Title
Enterprise Cyber Security
Code
ОК 30
Module type
Обов’язкова дисципліна для ОП
Educational cycle
First
Year of study when the component is delivered
2023/2024
Semester/trimester when the component is delivered
7 Semester
Number of ECTS credits allocated
5
Learning outcomes
Analyze, argue, and make decisions while solving special tasks and practical problems of telecommunications and radio engineering, which are characterized by complexity and incomplete determination of conditions. Apply results of personal search and analysis of information for solving qualitative and quantitative tasks of the similar character in information and communication networks, telecommunication and radio engineering systems. Single out and apply in professional activity testing technics of information-telecommunication networks, telecommunication and radio engineering systems for compliance with the requirements of domestic and international norms and regulations Be able to assess implementation efficiency of the perspective means and systems of cyber security, technologies that are used in creation of the systems of information and cyber security of the modern enterprise.
Form of study
Full-time form
Prerequisites and co-requisites
Possess knowledge of system analysis and synthesis, information leak channels in information and communication systems. Possess elementary skills of complex systems models creation. Wield basic theoretical notions as to technological processes planning and complex systems design.
Course content
At modern enterprise, creation, storing and authorized information transfer play crucial role. Vast majority of this information exists in cyber space and there are a lot of actors who want to gain unauthorized access to it. From this point, organization of cyber security at an enterprise assumes exceptional importance and comes to the fore of its operation. This subject is devoted to studying approaches, methods, principles and gaining practical skills of cyber security organization at an enterprise for preparing students to diligent fulfillment of their job-functions at companies, enterprises and institutions of telecommunication and information sectors of the state.
Recommended or required reading and other learning resources/tools
5. Плющ О. Г. Використання циклічних зсувів псевдовипадкової кодової послідовності для підвищення характеристик телекомунікаційного каналу / О. Г. Плющ // Кібербезпека: освіта, наука, техніка. – 2020. – № 1(9). – С. 126-139. DOI: 10.28925/2663-4023.2020.9.126139 6. Плющ О.Г. Побудова систем виявлення вторгнень в інформаційно-телекомунікаційну мережу на основі методів інтелектуального розподілу даних / С.В. Толюпа, О.Г. Плющ, І.І. Пархоменко // Збірник наукових праць Військового інституту Київського національного університету імені Тараса Шевченка. – 2020. – №68. С. 80-86.
Planned learning activities and teaching methods
Lectures, seminars, individual work
Assessment methods and criteria
Students are assessed during the semester. During the semester, students are evaluated on all types of activities. Overall grade for the semester is composed as the grade for answers produced at seminars, which comes to maximum 60 points, assessment of the tasks for independent work, which comes to 30 points, and assessment of the individual task, which comes to 10 points. If the student gets the resulting grade 60 points or more, he or she passes the test.
Language of instruction
Ukrainian

Lecturers

This discipline is taught by the following teachers

Departments

The following departments are involved in teaching the above discipline