Cycle of education: 2019/2020
The name of the faculty organization unit: The faculty Mathematics and Applied Physics
The name of the field of study: Engineering and data analysis
The area of study: sciences
The profile of studing:
The level of study: first degree study
Type of study: full time
discipline specialities :
The degree after graduating from university: engineer
The name of the module department : Department of Complex Systems
The code of the module: 12303
The module status: mandatory for teaching programme
The position in the studies teaching programme: sem: 5 / W30 L15 P15 / 4 ECTS / E
The language of the lecture: Polish
The name of the coordinator: Mariusz Nycz, PhD, Eng.
office hours of the coordinator: Aktualne terminy konsultacji znajdują się na stronie https://nyczm.v.prz.edu.pl/
The main aim of study: The main aim of education on the module is to present the technologies to ensure the security of transferring, storage and processing of information.
The general information about the module: The module provides the student familiar with the security features and requirements for the protection of information and administrative aspects, technical and physical security of information. The implementation of this order takes place during the lectures and laboratory exercises.
Teaching materials: https://nyczm.v.prz.edu.pl/
1 | W. Stallings | Kryptografia i bezpieczeństwo sieci komputerowych. Koncepcje i metody bezpiecznej komunikacji | Helion, Gliwice. | 2012 |
2 | W. Stallings | Kryptografia i bezpieczeństwo sieci komputerowych. Matematyka szyfrów i techniki kryptologii | Helion, Gliwice. | 2011 |
3 | M. Chris | Ocena bezpieczeństwa sieci wyd. 3 | Helion, Gliwice. | 2017 |
4 | J. Luttgens, M. Pepe, K. Mandia | Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej | Helion, Gliwice. | 2016 |
1 | M. Rash | Bezpieczeństwo sieci w Linuksie. Wykrywanie ataków i obrona przed nimi za pomocą iptables, psad i fw | Helion, Gliwice. | 2008 |
2 | M. Serafin | Sieci VPN. Zdalna praca i bezpieczeństwo danych. Wydanie II rozszerzone | Helion, Gliwice. | 2009 |
3 | R. Cameron, B. Woodberg, P. Giecco, T. Eberhard, J. Quinn | JUNOS Security | O'Reilly Media. | 2010 |
1 | M. Hajder, H. Lotuski, W. Stręciwilk | Informatyka - Wirtualna podróż w świat informatyki | WSIZ, Rzeszów. | 2003 |
Formal requirements: Students should know the basic issues of computer networks, databases, analysis and design of computer systems. The student satisfies the formal requirements set out in the study regulations.
Basic requirements in category knowledge: Students should have knowledge of network technology, ISO OSI model and TCP / IP.
Basic requirements in category skills: The student should be able to use knowledge of computer networks and operating systems to carry out simple engineering tasks related to the design of the safety and security information.
Basic requirements in category social competences: The student should be able to work individually and in a team, presenting its results in a group and as a report.
MEK | The student who completed the module | Types of classes / teaching methods leading to achieving a given outcome of teaching | Methods of verifying every mentioned outcome of teaching | Relationships with KEK | Relationships with PRK |
---|---|---|---|---|---|
01 | Explains the basic theoretical aspects of information security and protection of information and information protected by the RP and its legal mandate. | lecture, laboratory | test part. written, written test (input test), performance monitoring, report writing |
K_W07+ K_K02++ |
P6S_KK P6S_KO P6S_WG |
02 | Present the basic principles of environmental protection including IT security server, operating systems and software. | lecture, laboratory | test part. written, written test (input test), performance monitoring, report writing |
K_U16+++ K_K02++ |
P6S_KK P6S_KO P6S_UW |
03 | Manage systems which ensure the protection of classified information of the IT environment. | lecture, laboratory | test part. written, written test (input test), performance monitoring, report writing |
K_W08++ K_K02++ |
P6S_KK P6S_KO P6S_WG |
04 | Develops and manages systems security across the enterprise. He takes the principle of protection of information in IT systems business. | lecture, laboratory | test part. written, written test (input test), performance monitoring, report writing |
K_W08++ K_U15+++ |
P6S_UW P6S_WG |
Attention: Depending on the epidemic situation, verification of the achieved learning outcomes specified in the study program, in particular credits and examinations at the end of specific classes, can be implemented remotely (real-time meetings).
Sem. | TK | The content | realized in | MEK |
---|---|---|---|---|
5 | TK01 | W01, L01, P01 | MEK01 | |
5 | TK02 | W02, W03, L02 | MEK01 | |
5 | TK03 | W04, W05, L03, P02, P03, P04 | MEK01 MEK03 | |
5 | TK04 | W05, P05, P06 | MEK01 MEK03 | |
5 | TK05 | W06, L04 | MEK02 MEK04 | |
5 | TK06 | W07, W08, L05, P07 | MEK01 MEK03 | |
5 | TK07 | W09, W10, L06 | MEK01 MEK02 MEK04 | |
5 | TK08 | W11, W12 | MEK02 MEK04 | |
5 | TK09 | W13, W14, L07 | MEK02 MEK04 | |
5 | TK10 | W15 | MEK02 MEK03 MEK04 |
The type of classes | The work before classes | The participation in classes | The work after classes |
---|---|---|---|
Lecture (sem. 5) | contact hours:
30.00 hours/sem. |
complementing/reading through notes:
5.00 hours/sem. Studying the recommended bibliography: 10.00 hours/sem. |
|
Laboratory (sem. 5) | The preparation for a Laboratory:
10.00 hours/sem. The preparation for a test: 5.00 hours/sem. |
contact hours:
15.00 hours/sem. |
Finishing/Making the report:
5.00 hours/sem. |
Project/Seminar (sem. 5) | The preparation for projects/seminars:
10.00 hours/sem. |
contact hours:
15.00 hours/sem.. |
|
Advice (sem. 5) | |||
Exam (sem. 5) |
The type of classes | The way of giving the final grade |
---|---|
Lecture | The lecture ends with a writing test. The release to pass the course is a positive final evaluation of the laboratory. |
Laboratory | All laboratories must be completed to pass the course. Grading grades: 0-50% - 2.0, 51-65% - 3.0, 66-75% - 3.5, 76-84% - 4.0, 85-92% - 4.5, 93-100% - 5.0. The final test covering the whole material will take place in the last week of the semester. General rules for using the laboratory and OHS are in the laboratory regulations displayed in the laboratory room. |
Project/Seminar | Design classes ending with presentations. |
The final grade | The final grade is issued as a weighted average of 2/3 marks from the laboratory and projects. |
Required during the exam/when receiving the credit
pytania_bezpieczenstwo_2018.pdf
Realized during classes/laboratories/projects
(-)
Others
(-)
Can a student use any teaching aids during the exam/when receiving the credit : no
1 | P. Dymora; M. Mazurek; M. Nycz | Comparison of Angular, React, and Vue Technologies in the Process of Creating Web Applications on the User Interface Side | 2023 |
2 | P. Dymora; M. Mazurek; M. Nycz | Modeling and Statistical Analysis of Data Breach Problems in Python | 2023 |
3 | M. Hajder; P. Hajder; M. Liput; M. Nycz | Information Security of Weather Monitoring System with Elements of Internet Things | 2021 |
4 | M. Hajder; P. Hajder; M. Nycz | Security of Cyber-Physical Monitoring and Warning Systems for Natural and Technological Threats | 2021 |
5 | B. Kowal; M. Nycz | Opracowanie opinii o innowacyjności dla rozwiazania \"Węzeł przyłączeniowo-zrzutowy-campera ECO-BOX\" | 2020 |
6 | M. Hajder; P. Hajder; J. Kolbusz; M. Liput; M. Nycz | Data security platform model in networked medical IT systems based on statistical classifiers and ANN | 2020 |
7 | M. Hajder; P. Hajder; M. Liput; M. Nycz | Direct communication of edge elements in the Industrial Internet of Things | 2020 |
8 | M. Hajder; P. Hajder; M. Liput; M. Nycz | Security of cyber-physical environmental monitoring systems based on Internet of Things – basic challenges | 2020 |
9 | M. Hajder; P. Hajder; M. Liput; M. Nycz | Security of cyber-physical environmental monitoring systems based on Internet of Things – reliability and survivability | 2020 |
10 | M. Hajder; P. Hajder; M. Nycz | Low-Cost Architecture of the Universal Security Threat Detection System for Industrial IoT | 2020 |
11 | M. Nycz | Social and technical aspects of security : społeczne i techniczne aspekty bezpieczeństwa | 2020 |
12 | A. Gerka; M. Nycz; M. Totoń | Potwierdzenie wdrożenia innowacji dla projektu pn. Wdrożenie innowacyjnego systemu HiLight do zarządzania wielokanałową komunikacja cyfrową | 2019 |
13 | M. Hajder; P. Hajder; M. Nycz | Bezpieczeństwo informacji. Podejście kompleksowe | 2019 |
14 | M. Hajder; P. Hajder; M. Nycz | Elimination of digital exclusion of senior as a step for longevity | 2019 |
15 | M. Hajder; P. Hajder; M. Nycz; Ł. Rauch | A heterogeneous parallel processing system based on virtual multi-bus connection network | 2019 |
16 | M. Nycz | Social and technical aspects of security | 2019 |