logo
Item card
logo

Designing security systems

Some basic information about the module

Cycle of education: 2019/2020

The name of the faculty organization unit: The faculty Mathematics and Applied Physics

The name of the field of study: Engineering and data analysis

The area of study: sciences

The profile of studing:

The level of study: first degree study

Type of study: full time

discipline specialities :

The degree after graduating from university: engineer

The name of the module department : Department of Complex Systems

The code of the module: 12303

The module status: mandatory for teaching programme

The position in the studies teaching programme: sem: 5 / W30 L15 P15 / 4 ECTS / E

The language of the lecture: Polish

The name of the coordinator: Mariusz Nycz, PhD, Eng.

office hours of the coordinator: Aktualne terminy konsultacji znajdują się na stronie https://nyczm.v.prz.edu.pl/

The aim of studying and bibliography

The main aim of study: The main aim of education on the module is to present the technologies to ensure the security of transferring, storage and processing of information.

The general information about the module: The module provides the student familiar with the security features and requirements for the protection of information and administrative aspects, technical and physical security of information. The implementation of this order takes place during the lectures and laboratory exercises.

Teaching materials: https://nyczm.v.prz.edu.pl/

Bibliography required to complete the module
Bibliography used during lectures
1 W. Stallings Kryptografia i bezpieczeństwo sieci komputerowych. Koncepcje i metody bezpiecznej komunikacji Helion, Gliwice. 2012
2 W. Stallings Kryptografia i bezpieczeństwo sieci komputerowych. Matematyka szyfrów i techniki kryptologii Helion, Gliwice. 2011
3 M. Chris Ocena bezpieczeństwa sieci wyd. 3 Helion, Gliwice. 2017
4 J. Luttgens, M. Pepe, K. Mandia Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej Helion, Gliwice. 2016
Bibliography used during classes/laboratories/others
1 M. Rash Bezpieczeństwo sieci w Linuksie. Wykrywanie ataków i obrona przed nimi za pomocą iptables, psad i fw Helion, Gliwice. 2008
2 M. Serafin Sieci VPN. Zdalna praca i bezpieczeństwo danych. Wydanie II rozszerzone Helion, Gliwice. 2009
3 R. Cameron, B. Woodberg, P. Giecco, T. Eberhard, J. Quinn JUNOS Security O'Reilly Media. 2010
Bibliography to self-study
1 M. Hajder, H. Lotuski, W. Stręciwilk Informatyka - Wirtualna podróż w świat informatyki WSIZ, Rzeszów. 2003

Basic requirements in category knowledge/skills/social competences

Formal requirements: Students should know the basic issues of computer networks, databases, analysis and design of computer systems. The student satisfies the formal requirements set out in the study regulations.

Basic requirements in category knowledge: Students should have knowledge of network technology, ISO OSI model and TCP / IP.

Basic requirements in category skills: The student should be able to use knowledge of computer networks and operating systems to carry out simple engineering tasks related to the design of the safety and security information.

Basic requirements in category social competences: The student should be able to work individually and in a team, presenting its results in a group and as a report.

Module outcomes

MEK The student who completed the module Types of classes / teaching methods leading to achieving a given outcome of teaching Methods of verifying every mentioned outcome of teaching Relationships with KEK Relationships with PRK
01 Explains the basic theoretical aspects of information security and protection of information and information protected by the RP and its legal mandate. lecture, laboratory test part. written, written test (input test), performance monitoring, report writing K_W07+
K_K02++
P6S_KK
P6S_KO
P6S_WG
02 Present the basic principles of environmental protection including IT security server, operating systems and software. lecture, laboratory test part. written, written test (input test), performance monitoring, report writing K_U16+++
K_K02++
P6S_KK
P6S_KO
P6S_UW
03 Manage systems which ensure the protection of classified information of the IT environment. lecture, laboratory test part. written, written test (input test), performance monitoring, report writing K_W08++
K_K02++
P6S_KK
P6S_KO
P6S_WG
04 Develops and manages systems security across the enterprise. He takes the principle of protection of information in IT systems business. lecture, laboratory test part. written, written test (input test), performance monitoring, report writing K_W08++
K_U15+++
P6S_UW
P6S_WG

Attention: Depending on the epidemic situation, verification of the achieved learning outcomes specified in the study program, in particular credits and examinations at the end of specific classes, can be implemented remotely (real-time meetings).

The syllabus of the module

Sem. TK The content realized in MEK
5 TK01 Organizational activities. Determination of forms of assessment and the scope of the material. Getting to know the rules of working in the laboratory. W01, L01, P01 MEK01
5 TK02 Key management and distribution: Key distribution using symmetric and asymmetric cryptography, public key distribution, the standard X.509, public key infrastructure W02, W03, L02 MEK01
5 TK03 User authentication: Authentication rules for remote users, remote user authentication using symmetric and asymmetric cryptography, Kerberos, federated identity management W04, W05, L03, P02, P03, P04 MEK01 MEK03
5 TK04 Security of data transport: the elements of network security, SSL, HTTPS, SSH W05, P05, P06 MEK01 MEK03
5 TK05 Wireless Security: wireless IEEE 802.11i IEEE 802.11 WAP, WTLS, WPA2 W06, L04 MEK02 MEK04
5 TK06 E-mail Security: PGP, S/MIME, DKIM W07, W08, L05, P07 MEK01 MEK03
5 TK07 Security of IP: security policy by IPsec, ESP protocol, regroup security associations, the Internet key exchange (IKE) W09, W10, L06 MEK01 MEK02 MEK04
5 TK08 System security: intrusion detection, password management W11, W12 MEK02 MEK04
5 TK09 Malicious software: types of malware, viruses, preventing viruses, worms, DoS W13, W14, L07 MEK02 MEK04
5 TK10 Firewalls: firewalls characteristics, types of firewalls, implement firewalls, location and configuration of firewalls W15 MEK02 MEK03 MEK04

The student's effort

The type of classes The work before classes The participation in classes The work after classes
Lecture (sem. 5) contact hours: 30.00 hours/sem.
complementing/reading through notes: 5.00 hours/sem.
Studying the recommended bibliography: 10.00 hours/sem.
Laboratory (sem. 5) The preparation for a Laboratory: 10.00 hours/sem.
The preparation for a test: 5.00 hours/sem.
contact hours: 15.00 hours/sem.
Finishing/Making the report: 5.00 hours/sem.
Project/Seminar (sem. 5) The preparation for projects/seminars: 10.00 hours/sem.
contact hours: 15.00 hours/sem..
Advice (sem. 5)
Exam (sem. 5)

The way of giving the component module grades and the final grade

The type of classes The way of giving the final grade
Lecture The lecture ends with a writing test. The release to pass the course is a positive final evaluation of the laboratory.
Laboratory All laboratories must be completed to pass the course. Grading grades: 0-50% - 2.0, 51-65% - 3.0, 66-75% - 3.5, 76-84% - 4.0, 85-92% - 4.5, 93-100% - 5.0. The final test covering the whole material will take place in the last week of the semester. General rules for using the laboratory and OHS are in the laboratory regulations displayed in the laboratory room.
Project/Seminar Design classes ending with presentations.
The final grade The final grade is issued as a weighted average of 2/3 marks from the laboratory and projects.

Sample problems

Required during the exam/when receiving the credit
pytania_bezpieczenstwo_2018.pdf

Realized during classes/laboratories/projects
(-)

Others
(-)

Can a student use any teaching aids during the exam/when receiving the credit : no

The contents of the module are associated with the research profile: yes

1 P. Dymora; M. Mazurek; M. Nycz Comparison of Angular, React, and Vue Technologies in the Process of Creating Web Applications on the User Interface Side 2023
2 P. Dymora; M. Mazurek; M. Nycz Modeling and Statistical Analysis of Data Breach Problems in Python 2023
3 M. Hajder; P. Hajder; M. Liput; M. Nycz Information Security of Weather Monitoring System with Elements of Internet Things 2021
4 M. Hajder; P. Hajder; M. Nycz Security of Cyber-Physical Monitoring and Warning Systems for Natural and Technological Threats 2021
5 B. Kowal; M. Nycz Opracowanie opinii o innowacyjności dla rozwiazania \"Węzeł przyłączeniowo-zrzutowy-campera ECO-BOX\" 2020
6 M. Hajder; P. Hajder; J. Kolbusz; M. Liput; M. Nycz Data security platform model in networked medical IT systems based on statistical classifiers and ANN 2020
7 M. Hajder; P. Hajder; M. Liput; M. Nycz Direct communication of edge elements in the Industrial Internet of Things 2020
8 M. Hajder; P. Hajder; M. Liput; M. Nycz Security of cyber-physical environmental monitoring systems based on Internet of Things – basic challenges 2020
9 M. Hajder; P. Hajder; M. Liput; M. Nycz Security of cyber-physical environmental monitoring systems based on Internet of Things – reliability and survivability 2020
10 M. Hajder; P. Hajder; M. Nycz Low-Cost Architecture of the Universal Security Threat Detection System for Industrial IoT 2020
11 M. Nycz Social and technical aspects of security : społeczne i techniczne aspekty bezpieczeństwa 2020
12 A. Gerka; M. Nycz; M. Totoń Potwierdzenie wdrożenia innowacji dla projektu pn. Wdrożenie innowacyjnego systemu HiLight do zarządzania wielokanałową komunikacja cyfrową 2019
13 M. Hajder; P. Hajder; M. Nycz Bezpieczeństwo informacji. Podejście kompleksowe 2019
14 M. Hajder; P. Hajder; M. Nycz Elimination of digital exclusion of senior as a step for longevity 2019
15 M. Hajder; P. Hajder; M. Nycz; Ł. Rauch A heterogeneous parallel processing system based on virtual multi-bus connection network 2019
16 M. Nycz Social and technical aspects of security 2019