Security of information systems
Field of study: Computer Science
Programme code: 08-S2INIA15.2017

Module name: | Security of information systems |
---|---|
Module code: | 08-IN-IJO-S2-BSI |
Programme code: | 08-S2INIA15.2017 |
Semester: |
|
Language of instruction: | English |
Form of verification: | course work |
ECTS credits: | 2 |
Description: | Module enables practical knowledge acquisition with issues of data protection |
Prerequisites: | (no information given) |
Key reading: | (no information given) |
Learning outcome of the module | Codes of the learning outcomes of the programme to which the learning outcome of the module is related [level of competence: scale 1-5] |
---|---|
Student can work in co-ordination group. [BSI-K_1] |
K_2_A_I_K01 [2/5] |
Student can define tasks necessary to realize data security. [BSI-K_2] |
K_2_A_I_K05 [3/5] |
Student can differentiate various aspects of IT system security. [BSI-U_1] |
K_2_A_I_U01 [2/5] |
Student can acquire information necessary to realize appropriate level of security. [BSI-U_2] |
K_2_A_I_U01 [1/5] |
Student can select correct solution for a specific usage. [BSI-U_3] |
K_2_A_I_U08 [2/5] |
Student can simulate operation of many modern cryptographic algorithms. [BSI-U_4] |
K_2_A_I_U08 [1/5] |
Student knows basic terminology in the field of IT systems security. [BSI-W_1] |
K_2_A_I_W20 [3/5] |
Student gets acquainted with professional software methods of authentication. [BSI-W_2] |
K_2_A_I_W10 [2/5] |
Student gets acquainted with other authentication methods – biometrics. [BSI-W_3] |
K_2_A_I_W11 [1/5] |
Student knows issues connected with allocation of allowances. [BSI-W_4] |
K_2_A_I_W10 [2/5] |
Student gets acquainted with modern cryptography characteristic. [BSI-W_5] |
K_2_A_I_W02 [2/5] |
Student gets acquainted with mechanisms of managing remote devices in each level of mobile services life-cycle. [BSI-W_6] |
K_2_A_I_W01 [2/5] |
Student gets acquainted with security audit methods. [BSI-W_7] |
K_2_A_I_W01 [4/5] |
Practical methods of graphic and audio data protection. [BSI-W_8] |
K_2_A_I_W02 [3/5] |
Practical methods of multimedia and documents backups in a cloud. [BSI-W_9] |
K_2_A_I_W04 [2/5] |
Type | Description | Codes of the learning outcomes of the module to which assessment is related |
---|---|---|
Laboratory class credit [BSI_w_2] | Credit grade is the result of partial gardes obtained during a semester from particular tests. |
BSI-K_1 |
Project works [BSI_w_3] | Project tasks sum up the effects of partial works. |
BSI-U_3 |
Form of teaching | Student's own work | Assessment of the learning outcomes | |||
---|---|---|---|---|---|
Type | Description (including teaching methods) | Number of hours | Description | Number of hours | |
lecture [BSI_fs_1] | It is presentation of the newest solutions in the field of data security, with use of audio-visual aids. |
0 | (no information given) |
||
laboratory classes [BSI_fs_2] | It is a presentation of the newest solutions in the field of data security, with use of audiovisual aids. Realization of practical solutions by groups of students and individually. |
30 | Independently deepening and consolidating the subject matter of the classes. Solving tasks and work on a security project.
|
30 |
Laboratory class credit [BSI_w_2] |
Attachments |
---|
Module description (PDF) |
Syllabuses (USOSweb) | ||
---|---|---|
Semester | Module | Language of instruction |
(no information given) |