Bachelor
2020/2021
Basics of Information Security
Category 'Best Course for Broadening Horizons and Diversity of Knowledge and Skills'
Type:
Elective course (HSE University and University of London Parallel Degree Programme in Management and Digital Innovation)
Area of studies:
Business Informatics
Delivered by:
Department of Business Informatics
Where:
Graduate School of Business
When:
3 year, 3, 4 module
Mode of studies:
offline
Instructors:
Alexander Sorokin
Language:
English
ECTS credits:
4
Contact hours:
40
Course Syllabus
Abstract
Basics of Information Security is an elective course for third-year undergraduate students taught in English. The course is about the basic principles of information security as a task to solve and the overview of most common means and methods for it. This includes procedural controls, cryptography and steganography as well as protection from malware or exploitation of technical means of illegal information gathering.
Learning Objectives
- Formation of students' knowledge of the role of information security in the management of information processes
- Formation of students' understanding of the variety of possible means and methods of providing security of information.
Expected Learning Outcomes
- A student is able to explain the meaning of integrity, confidentiality and availability of information.
- A student is able to explain the approach to maintaining information security based on identifying the threats, evaluating their danger and addressing them accordingly.
- A student is able to describe the main sources of regulatory request for information security
- A student is able to describe the main classes of threats of information security and their sources
Course Contents
- The Concept of Information SecurityMain definitions of information security are introduces in this section as well as basic ideas and approaches
Assessment Elements
- ExamExam is held online in MS Teams. Precise technical instructions are to be published in the team of the subject.
- Presentation
- Essay
Bibliography
Recommended Core Bibliography
- Awad, A. I., & Fairhurst, M. C. (2018). Information Security : Foundations, Technologies and Applications. London, United Kingdom: The Institution of Engineering and Technology. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsebk&AN=1805102
- Axelrod, C. W., Bayuk, J. L., & Schutzer, D. (2009). Enterprise Information Security and Privacy. Boston: Artech House, Inc. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsebk&AN=285008
- Cloud security and privacy, Mather, T., 2009
- Computer security, Gollmann, D., 2006
- Cyber security : an introduction for non-technical managers, Green, J. S., 2015
- Cyber security : economic strategies and public policy alternatives, Gallaher, M. P., 2008
- Cyber security and the UK's critical national infrastructure : a Chatham House report, Sept. 2011, Cornish, P., 2011
- Cybersecurity and cyber-information sharing : legal and economic analyses, Morgan, J. M., 2015
Recommended Additional Bibliography
- Critical approaches to security : an introduction to theories and methods, , 2013
- Cybersecurity and cyberwar : what everyone needs to know, Singer, P. W., 2014
- Ștefănescu, C., Comănescu, L. E., Buhuși, C., & Bîlcan, G. A. (2019). Theoretical Approaches to Estimate the Information Security Risks. Academic Journal of Economic Studies, 5(3), 120–125. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=bsu&AN=138862162