Security of Information Systems Field of study: Computer Science
Programme code: 08-S2INIA15.2016

Module name: Security of Information Systems
Module code: 08-IN-IJO-S2-BSI
Programme code: 08-S2INIA15.2016
Semester: summer semester 2016/2017
Language of instruction: English
Form of verification: course work
ECTS credits: 1
Description:
Module enables practical knowledge acquisition with issues of data protection
Prerequisites:
(no information given)
Key reading:
(no information given)
Learning outcome of the module Codes of the learning outcomes of the programme to which the learning outcome of the module is related [level of competence: scale 1-5]
Can work in a team with tasks co-ordination. [BSI-K_1]
K_2_A_I_K01 [2/5] K_2_A_I_K03 [3/5]
Can define tasks to be performed to realize data security. [BSI-K_2]
K_2_A_I_K05 [3/5] K_2_A_I_K06 [2/5]
Student can differentiate various aspects of IT system security. [BSI-U_1]
K_2_A_I_U01 [2/5] K_2_A_I_U03 [3/5]
Can acquire information necessary to realize appropriate level of security. [BSI-U_2]
K_2_A_I_U01 [1/5] K_2_A_I_U10 [4/5]
Can select solutions for a specific use. [BSI-U_3]
K_2_A_I_U08 [2/5] K_2_A_I_U16 [1/5]
Can simulate operation of modern cryptographic algorithms. [BSI-U_4]
K_2_A_I_U08 [1/5] K_2_A_I_U13 [1/5] K_2_A_I_U15 [1/5] K_2_A_I_U19 [2/5]
Knows basic terminology In the field of IT systems security. [BSI-W_1]
K_2_A_I_W20 [3/5] K_2_A_I_W21 [2/5]
Gets acquainted with professional software methods of authentication. [BSI-W_2]
K_2_A_I_W10 [2/5] K_2_A_I_W20 [3/5]
Gets acquainted with other authentication methods – biometrics. [BSI-W_3]
K_2_A_I_W11 [1/5] K_2_A_I_W12 [2/5] K_2_A_I_W14 [2/5]
Knows issues connected with allocation of allowances. [BSI-W_4]
K_2_A_I_W10 [2/5] K_2_A_I_W20 [3/5]
Gets acquainted with modern cryptography characteristics. [BSI-W_5]
K_2_A_I_W02 [2/5] K_2_A_I_W03 [2/5] K_2_A_I_W20 [1/5]
Gets acquainted with mechanisms of managing remote devices in each level of mobile services life-cycle. [BSI-W_6]
K_2_A_I_W01 [2/5] K_2_A_I_W04 [2/5] K_2_A_I_W08 [1/5]
Gets acquainted with methods of security audit. [BSI-W_7]
K_2_A_I_W01 [4/5] K_2_A_I_W11 [1/5]
Practical methods of graphic and audio data protection. [BSI-W_8]
K_2_A_I_W02 [3/5]
Practical methods of multimedia and documents backup in a cloud. [BSI-W_9]
K_2_A_I_W04 [2/5] K_2_A_I_W11 [3/5]
Type Description Codes of the learning outcomes of the module to which assessment is related
Lecture credit [BSI_w_1]
The grade verifies possessed knowledge and, above all, its understanding. It is exhibited by control tests and additional elaborations.
BSI-W_1 BSI-W_2 BSI-W_3 BSI-W_4 BSI-W_5 BSI-W_6 BSI-W_7 BSI-W_8 BSI-W_9
Laboratory class credit [BSI_w_2]
Credit grade is the result of partial gardes obtained during a semester from particular tests.
BSI-K_1 BSI-K_2 BSI-U_1 BSI-U_2 BSI-U_3 BSI-U_4
Project works [BSI_w_3]
Project tasks sum up the effects of partial works.
BSI-U_3 BSI-U_4 BSI-W_3 BSI-W_7
Form of teaching Student's own work Assessment of the learning outcomes
Type Description (including teaching methods) Number of hours Description Number of hours
lecture [BSI_fs_1]
It is presentation of the newest solutions in the field of data security, with use of audio-visual aids.
15
(no information given)
Lecture credit [BSI_w_1]
laboratory classes [BSI_fs_2]
It is the realization of practical solutions by groups of students and individually.
15
(no information given)
Laboratory class credit [BSI_w_2] Project works [BSI_w_3]
Attachments
Module description (PDF)
Information concerning module syllabuses might be changed during studies.
Syllabuses (USOSweb)
Semester Module Language of instruction
(no information given)