• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Bachelor 2020/2021

Basics of Information Security

Category 'Best Course for Broadening Horizons and Diversity of Knowledge and Skills'
Area of studies: Business Informatics
When: 3 year, 3, 4 module
Mode of studies: offline
Instructors: Alexander Sorokin
Language: English
ECTS credits: 4
Contact hours: 40

Course Syllabus

Abstract

Basics of Information Security is an elective course for third-year undergraduate students taught in English. The course is about the basic principles of information security as a task to solve and the overview of most common means and methods for it. This includes procedural controls, cryptography and steganography as well as protection from malware or exploitation of technical means of illegal information gathering.
Learning Objectives

Learning Objectives

  • Formation of students' knowledge of the role of information security in the management of information processes
  • Formation of students' understanding of the variety of possible means and methods of providing security of information.
Expected Learning Outcomes

Expected Learning Outcomes

  • A student is able to explain the meaning of integrity, confidentiality and availability of information.
  • A student is able to explain the approach to maintaining information security based on identifying the threats, evaluating their danger and addressing them accordingly.
  • A student is able to describe the main sources of regulatory request for information security
  • A student is able to describe the main classes of threats of information security and their sources
Course Contents

Course Contents

  • The Concept of Information Security
    Main definitions of information security are introduces in this section as well as basic ideas and approaches
Assessment Elements

Assessment Elements

  • non-blocking Exam
    Exam is held online in MS Teams. Precise technical instructions are to be published in the team of the subject.
  • non-blocking Presentation
  • non-blocking Essay
Interim Assessment

Interim Assessment

  • Interim assessment (4 module)
    0.4 * Essay + 0.4 * Exam + 0.2 * Presentation
Bibliography

Bibliography

Recommended Core Bibliography

  • Awad, A. I., & Fairhurst, M. C. (2018). Information Security : Foundations, Technologies and Applications. London, United Kingdom: The Institution of Engineering and Technology. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsebk&AN=1805102
  • Axelrod, C. W., Bayuk, J. L., & Schutzer, D. (2009). Enterprise Information Security and Privacy. Boston: Artech House, Inc. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsebk&AN=285008
  • Cloud security and privacy, Mather, T., 2009
  • Computer security, Gollmann, D., 2006
  • Cyber security : an introduction for non-technical managers, Green, J. S., 2015
  • Cyber security : economic strategies and public policy alternatives, Gallaher, M. P., 2008
  • Cyber security and the UK's critical national infrastructure : a Chatham House report, Sept. 2011, Cornish, P., 2011
  • Cybersecurity and cyber-information sharing : legal and economic analyses, Morgan, J. M., 2015

Recommended Additional Bibliography

  • Critical approaches to security : an introduction to theories and methods, , 2013
  • Cybersecurity and cyberwar : what everyone needs to know, Singer, P. W., 2014
  • Ștefănescu, C., Comănescu, L. E., Buhuși, C., & Bîlcan, G. A. (2019). Theoretical Approaches to Estimate the Information Security Risks. Academic Journal of Economic Studies, 5(3), 120–125. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=bsu&AN=138862162