Security of Information Systems
Field of study: Computer Science
Programme code: 08-S2INIA15.2016

Module name: | Security of Information Systems |
---|---|
Module code: | 08-IN-ISI-S2-BSI |
Programme code: | 08-S2INIA15.2016 |
Semester: | summer semester 2017/2018 |
Language of instruction: | English |
Form of verification: | course work |
ECTS credits: | 3 |
Description: | Module enables practical familiarization with issues connected with data protection |
Prerequisites: | (no information given) |
Key reading: | (no information given) |
Learning outcome of the module | Codes of the learning outcomes of the programme to which the learning outcome of the module is related [level of competence: scale 1-5] |
---|---|
Can work in a team with tasks coordination [BSI -K_1] |
K_2_A_I_K01 [2/5] |
Is able to define tasks for realizing data security [BSI -K_2] |
K_2_A_I_K05 [3/5] |
Student can differentiate various aspects of computer system security. [BSI -U_1] |
K_2_A_I_U01 [2/5] |
Is able to gather information necessary to realize appropriate level of protection [BSI -U_2] |
K_2_A_I_U01 [1/5] |
Can select solutions for a definite usage. [BSI -U_3] |
K_2_A_I_U08 [2/5] |
Is able to prepare and give a presentation of various modern cryptographic algorithms operation [BSI -U_4] |
K_2_A_I_U04 [1/5] |
Knows basic terminology in the field of information systems security [BSI W_1] |
K_2_A_I_W20 [3/5] |
Knows mechanisms of hash function. [BSI W_10] |
K_2_A_I_W02 [5/5] |
Knows practical methods of graphic and audio data protection. [BSI W_11] |
K_2_A_I_W02 [2/5] |
Knows example attacks connected with access control [BSI W_12] |
K_2_A_I_W20 [5/5] |
Learns professional software methods of authentication. [BSI W_2] |
K_2_A_I_W10 [2/5] |
Learns other methods of authentication. [BSI W_3] |
K_2_A_I_W11 [1/5] |
Knows issues connected with implementation of authorization. [BSI W_4] |
K_2_A_I_W10 [2/5] |
Knows classical cryptography. [BSI W_5] |
K_2_A_I_W02 [3/5] |
Learns characteristics of modern cryptography. [BSI W_6] |
K_2_A_I_W02 [2/5] |
Learns mechanisms of cryptographic algorithms operation [BSI W_7] |
K_2_A_I_W02 [2/5] |
Knows the issues of digital signatures. [BSI W_8] |
K_2_A_I_W03 [1/5] |
Learns basics of cryptanalysis [BSI W_9] |
K_2_A_I_W02 [2/5] |
Type | Description | Codes of the learning outcomes of the module to which assessment is related |
---|---|---|
Lecture credit [BSI _w_1] | The credit verifies possessed knowledge, emphasizing its understanding. It is indicated by tests. |
BSI W_1 |
Laboratory class credit [BSI _w_2] | The grade is a result of partial grades obtained in the course of semester from appropriate tests |
BSI -K_1 |
Project works [BSI _w_3] | Project tasks sum up the effects of partial works |
BSI -U_3 |
Form of teaching | Student's own work | Assessment of the learning outcomes | |||
---|---|---|---|---|---|
Type | Description (including teaching methods) | Number of hours | Description | Number of hours | |
lecture [BSI _fs_1] | It is a presentation of the newest solutions in the field of data security with use of audiovisual aids |
15 | Student has to analyze the presented ideas, verify their utility and use suggestions. |
10 |
Lecture credit [BSI _w_1] |
laboratory classes [BSI _fs_2] | It is the realization of practical solutions by groups of students and individually |
30 | Student realizes project and implementation works during classes and at home. More complex tasks are performed in teams.
Individual or team work, discussion over complex problems connected with issues presented during a lecture
|
35 |
Laboratory class credit [BSI _w_2] |
Attachments |
---|
Module description (PDF) |
Syllabuses (USOSweb) | ||
---|---|---|
Semester | Module | Language of instruction |
(no information given) |