The discipline of Protecting Information in Computer Systems plays an important role in training professionals in the specialty Computer Systems and Networks. This discipline is included in the cycle of vocational disciplines in the field of "Computer Engineering". The program is built according to the requirements of the CISPS in higher education institutions and is consistent with the approximate structure of the training course program (according to the requirements of the European Credit Transfer System), approved by the Ministry of Education and Science of Ukraine letter No. 14/18, 2-715 dated 09.04.04 and is an independent discipline, which enables to define content modules of education, to coordinate credit systems of student achievement evaluation and is provided with external state and public quality control systems.
The work program of the discipline "Protection of information in computer systems" is an integral part of the regulatory and methodological support of the educational process in the specialty: 123 Computer Engineering. The subject of the course is the study of the theory and mechanisms of information security in computer systems, systems, mathematical apparatus and algorithms for cryptography of information, taking into account unauthorized access to it and secrecy. The content of the program includes lectures and laboratory work, as well as the execution of calculation and graphic works. The final control of knowledge is carried out by passing the exam.
The discipline "Information Security in Computer Systems" is based on subjects such as "Informatics", "Microelectronics", "Theory of Algorithms", "Circuitry" and "System Programming", In connection with the widespread introduction into the educational process of computers' computer science, knowledge gained in the study of information security in computer systems, is used in almost all informative disciplines.
Upon completion of the course "Computer Information Security" students will be able to:
- to analyze various types of information security means;
- to study the legal bases of protection of information media in Ukraine and abroad;
- to study the characteristics of advanced world security and encryption systems;
- practical use of symmetric encryption algorithms for transmission messages;
- use asymmetric encryption algorithms;
- use cryptographic hash and conversion functions;
- have an understanding of the use of public key encryption algorithms;
- be able to apply asymmetric encryption algorithms using elliptic curves;
- possess a variety of technical schemes for implementing block and stream cipher encryption.
The course material is structured according to a modular principle and consists of one training module, namely: "Methods, methods and means of protection of information in computer systems".
The module is a logically complete, relatively independent, integral part of the curriculum, the assimilation of which involves module control work and analysis of the results of its implementation.
Background Colour
Font Face
Font Size
Text Colour