Cycle of education: 2019/2020
The name of the faculty organization unit: The faculty Mathematics and Applied Physics
The name of the field of study: Engineering and data analysis
The area of study: sciences
The profile of studing:
The level of study: first degree study
Type of study: full time
discipline specialities :
The degree after graduating from university: engineer
The name of the module department : Department of Complex Systems
The code of the module: 12311
The module status: mandatory for teaching programme
The position in the studies teaching programme: sem: 5 / W15 L15 P15 / 2 ECTS / Z
The language of the lecture: Polish
The name of the coordinator: Mirosław Mazurek, PhD, Eng.
The main aim of study: The main aim of education on the module is to present selected issues of security systems and computer networks, in particular, encryption and cryptography.
The general information about the module: The module provides the student familiar with the techniques and basic encryption algorithms, modes and types of ciphers, authentication and digital signature.
Teaching materials: https://mmazurek.v.prz.edu.pl/
1 | Schneier Bruce | Kryptografia dla praktyków | Wydawnictwo Naukowo Techniczne. | 2002 |
2 | Stallings William | Ochrona danych w sieci i intersieci | Wydawnictwo Naukowo Techniczne. | 1997 |
3 | Seberry J., Pierzyk J | Cryptogaphy: An Introduction to Computer Security | Englewood Cliffs, NJ: Prentice-Hall. | 1989 |
4 | W. Stallings | "Kryptografia i bezpieczeństwo sieci komputerowych. Matematyka szyfrów i techniki kryptografii" | Helion. | 2011 |
5 | Chell, Dominic | Bezpieczeństwo aplikacji mobilnych: podręcznik hakera | Helion. | 2018 |
6 | Chris Sanders | Praktyczna analiza pakietów : wykorzystanie narzędzia Wireshark do rozwiązania problemów związanych z siecią | Helion. | 2018 |
7 | Waldemar Krztoń. | Walka o informację w cyberprzestrzeni w XXI wieku | Rambler Press. | 2017 |
1 | W. Stallings | "Kryptografia i bezpieczeństwo sieci komputerowych. Matematyka szyfrów i techniki kryptografii" | Helion. | 2011 |
2 | N. Ferguson, B. Schneier | Kryptografia w praktyce | Helion. | 2004 |
3 | Vijay Kumar Velu | Kali Linux : testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych | Helion. | 2018 |
1 | Ch. P. Pfleeger, S. L. Pfleeger | Security in Computing, 4th Edition | Prentice Hall. | 2006 |
2 | Chris Binnie | Linux Server : bezpieczeństwo i ochrona sieci | Helion. | 2017 |
3 | Izabela Oleksiewicz, Waldemar Krztoń | Bezpieczeństwo współczesnego społeczeństwa informacyjnego w cyberprzestrzeni / | Rambler Press. | 2017 |
Formal requirements: The student satisfies the formal requirements set out in the study regulations.
Basic requirements in category knowledge: The student should have knowledge in mathematics, number theory, used to encrypt information and have knowledge about the functioning and management of the computer network and system.
Basic requirements in category skills: The student should be able to use mathematical knowledge to encrypt and decrypt data, operation of algorithms and cryptographic systems.
Basic requirements in category social competences: Ability to work in a team.
MEK | The student who completed the module | Types of classes / teaching methods leading to achieving a given outcome of teaching | Methods of verifying every mentioned outcome of teaching | Relationships with KEK | Relationships with PRK |
---|---|---|---|---|---|
01 | Demonstrates how to encrypt the information, authentication, hashing | lecture, interactive lecture, laboratory, lab problem. | credit part. written, final part. oral, written report |
K_W06+++ K_U15+ |
P6S_UW P6S_WG |
02 | It explains the principles and methods to encrypt and decrypt information | Interactive lecture, laboratory, lab problem | credit part. written, final part. oral, written report |
K_W08++ K_K06+ |
P6S_KO P6S_KR P6S_WG |
03 | Designs and builds systems with public and private keys | Interactive lecture, lecture, laboratory | credit part. written, final part. oral, written report |
K_W11++ K_U19+ |
P6S_UW P6S_WK |
04 | Able to evaluate and adjust the level of system security and computer network to the requirements of security policy | lecture, lecture problem, a laboratory problem, seminar | credit part. written, final part. oral, written report |
K_W01+ K_K06+++ |
P6S_KO P6S_KR P6S_WG |
05 | Correctly interprets and applies the provisions resulting from laws, regulations, standards and regulations, including security policy | lecture, problem laboratory | written test, project report |
K_W11++ K_U15+++ |
P6S_UW P6S_WK |
06 | He knows the concept of risk and classifies it correctly. | interactive lecture, lecture, problem laboratory, individual project | pass the part practical |
K_W06+ K_U10++ |
P6S_UW P6S_WG |
07 | He can determine the risk of IT systems from the perspective of an audit. | lecture, laboratory | written report, colloquium |
K_W06+++ K_U19+ |
P6S_UW P6S_WG |
Attention: Depending on the epidemic situation, verification of the achieved learning outcomes specified in the study program, in particular credits and examinations at the end of specific classes, can be implemented remotely (real-time meetings).
Sem. | TK | The content | realized in | MEK |
---|---|---|---|---|
5 | TK01 | W01 | MEK04 MEK06 MEK07 | |
5 | TK02 | W02, W03, L01 | MEK02 MEK03 | |
5 | TK03 | W04, L02 | MEK02 MEK04 | |
5 | TK04 | W05, L03 | MEK01 MEK04 | |
5 | TK05 | W06, L04 | MEK03 MEK05 MEK06 | |
5 | TK06 | W07, L05, L12 | MEK01 MEK02 | |
5 | TK07 | W08, L06 | MEK02 | |
5 | TK08 | W09, L07, P 1-15 | MEK03 MEK04 | |
5 | TK09 | W10, W11, L08, L15, P 1-15 | MEK01 MEK03 | |
5 | TK10 | W12, L09 | MEK01 MEK04 | |
5 | TK11 | W13, L10 | MEK01 MEK06 | |
5 | TK12 | W14, L11, P1-5 | MEK04 MEK06 | |
5 | TK13 | W15, L13, L14, P 1-5 | MEK04 MEK07 |
The type of classes | The work before classes | The participation in classes | The work after classes |
---|---|---|---|
Lecture (sem. 5) | The preparation for a test:
2.00 hours/sem. |
contact hours:
15.00 hours/sem. |
complementing/reading through notes:
2.00 hours/sem. Studying the recommended bibliography: 1.00 hours/sem. |
Laboratory (sem. 5) | The preparation for a Laboratory:
1.00 hours/sem. The preparation for a test: 1.00 hours/sem. |
contact hours:
15.00 hours/sem. |
Finishing/Making the report:
1.00 hours/sem. |
Project/Seminar (sem. 5) | contact hours:
15.00 hours/sem.. |
Doing the project/report/ Keeping records:
5.00 hours/sem. |
|
Advice (sem. 5) | |||
Credit (sem. 5) |
The type of classes | The way of giving the final grade |
---|---|
Lecture | The lecture ends with a credit. The release to pass the course is a positive final evaluation of the laboratory. As part of the lectures, it is planned to implement 3-5 hours in the form of e-learning. The condition for passing this form is passing the checking quiz. |
Laboratory | The release for the implementation of the laboratory is to provide the teacher to assess reports of previously performed laboratory. To complete the course, complete all the labs. The final evaluation will assess first completion of the test increased or decreased based on assessments of the reports. Gradation ratings 0-50% - 2.0% 51-65 - 3.0, 66-75% - 3.5, 76-84% - 4.0; 85-92% - 4.5, 93-100% - 5.0. The presence of mandatory laboratory. |
Project/Seminar | |
The final grade | The final evaluation is the arithmetic mean of the completion of the lecture and laboratory evaluation. |
Required during the exam/when receiving the credit
(-)
Realized during classes/laboratories/projects
(-)
Others
(-)
Can a student use any teaching aids during the exam/when receiving the credit : no