Security of Data and IT Systems 420-IS2-2BDSI
Profile of studies: general-academic
Form of study: full-time
Type of subject: obligatory
Domain: exact and natural sciences, discipline: Information technology
Year of study / semester: 2/3
Prerequisites (so-called sequential system of classes and exams): none
Lecture: 15 Laboratory: 30
Teaching methods: lecture, laboratory
ECTS credits: 4
Balance of student workload:
Participation in classes:
- lecture 15h
- laboratory 30h
Reading the literature: 10h
Reports, reports from classes, homework: 30h
Preparation for the exam: 10h
Duration of the exam: 1h
Participation in consultations: 4h
Quantitative indicators:
- student workload related to the activities requiring the teacher's direct participation: 50h, 2 ECTS
- student workload that does not require the teacher's direct participation: 50h, 2 ECTS
Type of course
Mode
(in Polish) zdalnie
Prerequisites (description)
Course coordinators
Learning outcomes
He knows the issues of security of digital data and information systems. He knows the threats for information systems in the context of confidentiality, integrity and availability of information. KA7_WG7
He knows the models and security classes of information systems. He knows the methods of user identification and authentication. He knows the basics of cryptography as well as modern data encryption standards. KA7_WG7
He knows issues related to data security in the context of the functioning of wired and wireless computer networks, in particular the Internet and mobile devices . KA7_WG7
Ge is able to assess and strengthen data security in various configurations of the most popular operating systems (Unix, MS Windows) with the practical use of: access control mechanisms (alike Discretionary Access Control), firewalls, anti-virus programs, user authentication (using knowledge, tokens and biometric methods) and encryption. KA7_UW7, KA7_UW10, KA7_UW12
Is able to analyze and strengthen data security in local networks, including configure small wireless networks with access control and encryption. KA7_UW7, KA7_UW10, KA7_UW12
Is able to assess security and protect data (in particular personal and financial) on the Internet. KA7_UW7, KA7_UW10, KA7_UW12
He understands the role of data security and information systems for the functioning of modern society, is aware of the need to communicate to the public this knowledge and understands the role of unrestricted exchange of information in shaping social and political awareness. KA7_KR1
Assessment criteria
written exam (lecture), student monitoring and observation, programming projects
Bibliography
John R. Vacca, Network and System Security
David Kim and Michael G. Solomon, Fundamentals Of Information Systems Security (Information Systems Security & Assurance)
Mark Stamp, Information Security: Principles and Practice
Additional information
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: