IT security 2700-L-LM-D5BEZP-ZTM
1. Computer security institutions
2. Status and conditions of IT security
3. Trends in IT security
4. The categories of offenses IT
5. The market for IT security
6. The evolution of safety systems
7. Main areas related to IT security
8. Sources of danger
9. IT security rules
10. viruses - malware
A. Hazard Classification
B. Methods defense
11. Components of IT security
A. Reliability of IT systems, BCP
B Cryptography
C. Physical security - means and methods,
D. Organizational and personnel security,
E. Safe structured cabling,
F. Electromagnetic Protection,
G. Access control and authentication,
H. Electronic Signature
I. The essence of the firewall system IT security
J. Identification - methods and tools
K. Digital Wireless Security
L. Security Policy
M. Specific Security Requirements ICT.
N. Examples of integrated security systems with IT systems - identity management systems,
A. Backup,
P. mechanisms to control content information.
12. Organization of safeguarding information at the example of classified information
13. Sharing information and control their circulation
14. Protection of information:
a) Western standards,
b) The Polish conditions.
15. Disposal valuable company resources in emergencies and emergency situations:
a) preparatory,
b) the valuable resources of the company,
c) the management plan - plans,
d) replacement strategies.
e) testing business continuity plans.
f) to maintain and update plans
g) the procedure for liquidation of the company with valuable information assets.
16. Model security procedures in the institution:
a) the introduction,
b) the procedure for the safety of personnel,
c) the procedure for making the employees protected resources of the company,
d) the procedure for physical security,
e) the procedure IT security.
Main fields of studies for MISMaP
Type of course
obligatory courses
Mode
Prerequisites (description)
Learning outcomes
Supplementing the knowledge of the basics of computer science to the extent necessary to understand the problems of IT security and the security of information resources of the institution. Getting to know the basic conditions and the contemporary challenges of IT security (BTI). To learn the basic threats and how to defend themselves in enterprises of all sizes. Understanding the principles of security policy design and specific safety requirements ICT and Procedures for the Safe Operation.
Assessment criteria
Project realization - 75%
Attendance - 25%
Practical placement
Lack-of
Bibliography
1. A. Gałach, Zarządzanie bezpieczeństwem systemu informatycznego – uniwersalna lista kontrolna, Gdańsk, 2004.
2. Gogołek W., Informatyka dla humanistów, Wyd kropki trzy, Warszawa2012.
3. http://gogolek.pl/Prezentacje%20PI.html
Additional information
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: