Cryptography and information security

Course: Information Systems

Structural unit: Faculty of information Technology

Title
Cryptography and information security
Code
ОК 10
Module type
Обов’язкова дисципліна для ОП
Educational cycle
Second
Year of study when the component is delivered
2021/2022
Semester/trimester when the component is delivered
3 Semester
Number of ECTS credits allocated
5
Learning outcomes
Know the mechanisms and protocols for ensuring the confidentiality, authenticity and integrity of IS and T data. The ability to provide a reasonable selection of hardware and software to ensure the necessary level of information protection, apply existing and develop new algorithms for solving problems in the field of computer science.
Form of study
Full-time form
Prerequisites and co-requisites
Know the basics of algorithmization; concept of information system; basic concepts of the Internet. To be able to use basic knowledge to build algorithms that would ensure the solution of the tasks; perform practical and laboratory work, prepare and defend them; to formalize the execution and protection of independent works. Possess elementary skills of finding the necessary information for studying the discipline, use the e-learning system, knowledge assessment system and testing.
Course content
During the study of the discipline "Cryptography and security", the principles of building complex information protection systems, development, research and application of information protection mechanisms based on the use of algorithms of traditional (symmetric) cryptography and public key cryptography to ensure the authenticity, integrity and confidentiality of information are considered. systems and technologies.
Recommended or required reading and other learning resources/tools
1. Cyber security: modern protection technologies. Study guide / S.E. Ostapov, S.P. Yevseev, O.G. King. Lviv: Novy svit-2000, 2021. – 678 p. 2. Babalo Yu.Ya. Information security: a tutorial. Lviv: Lviv Polytechnic Publishing House, 2019. - 580 p. 3. Bogush V.M. Basics of cyberspace, cyber security and cyber defense. Tutorial. K.: Lira-K Publishing House, 2020. - 554 p. 4. Yevseyev S.P. Cyber Security: Cryptography with Python. Tutorial. - Kharkiv. - "New World-2000" Publishing House, 2021. - 120 p.
Planned learning activities and teaching methods
Lectures, laboratory classes, independent work
Assessment methods and criteria
The level of achievement of all planned learning outcomes is determined by the results of defense of laboratory work and individual tasks of independent work. Semester assessment of students is carried out during the semester for all types of work. The total score is formed as a weighted sum of points earned by the student for various types of work. The maximum number of points that a student can receive for work in a semester does not exceed 100 points. The final assessment form is an exam. The results of students' educational activities are evaluated on a 100-point scale. The work in the semester consists of two content modules, at the end of the study of each of which, after completion of the relevant topics, CW1, CW2 are conducted in the form of a written test with open questions. Before conducting control works, group consultations are held on the material of the relevant content module in order to generalize the studied material. The final control exam - a maximum of 40 points.
Language of instruction
Ukrainian

Lecturers

This discipline is taught by the following teachers

DEPARTMENT OF APPLIED INFORMATION SYSTEMS
Faculty of information Technology

Departments

The following departments are involved in teaching the above discipline

DEPARTMENT OF APPLIED INFORMATION SYSTEMS
Faculty of information Technology