logo
Item card
logo

Data security and protection

Some basic information about the module

Cycle of education: 2019/2020

The name of the faculty organization unit: The faculty Mathematics and Applied Physics

The name of the field of study: Engineering and data analysis

The area of study: sciences

The profile of studing:

The level of study: first degree study

Type of study: full time

discipline specialities :

The degree after graduating from university: engineer

The name of the module department : Department of Complex Systems

The code of the module: 12311

The module status: mandatory for teaching programme

The position in the studies teaching programme: sem: 5 / W15 L15 P15 / 2 ECTS / Z

The language of the lecture: Polish

The name of the coordinator: Mirosław Mazurek, PhD, Eng.

The aim of studying and bibliography

The main aim of study: The main aim of education on the module is to present selected issues of security systems and computer networks, in particular, encryption and cryptography.

The general information about the module: The module provides the student familiar with the techniques and basic encryption algorithms, modes and types of ciphers, authentication and digital signature.

Teaching materials: https://mmazurek.v.prz.edu.pl/

Bibliography required to complete the module
Bibliography used during lectures
1 Schneier Bruce Kryptografia dla praktyków Wydawnictwo Naukowo Techniczne. 2002
2 Stallings William Ochrona danych w sieci i intersieci Wydawnictwo Naukowo Techniczne. 1997
3 Seberry J., Pierzyk J Cryptogaphy: An Introduction to Computer Security Englewood Cliffs, NJ: Prentice-Hall. 1989
4 W. Stallings "Kryptografia i bezpieczeństwo sieci komputerowych. Matematyka szyfrów i techniki kryptografii" Helion. 2011
5 Chell, Dominic Bezpieczeństwo aplikacji mobilnych: podręcznik hakera Helion. 2018
6 Chris Sanders Praktyczna analiza pakietów : wykorzystanie narzędzia Wireshark do rozwiązania problemów związanych z siecią Helion. 2018
7 Waldemar Krztoń. Walka o informację w cyberprzestrzeni w XXI wieku Rambler Press. 2017
Bibliography used during classes/laboratories/others
1 W. Stallings "Kryptografia i bezpieczeństwo sieci komputerowych. Matematyka szyfrów i techniki kryptografii" Helion. 2011
2 N. Ferguson, B. Schneier Kryptografia w praktyce Helion. 2004
3 Vijay Kumar Velu Kali Linux : testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych Helion. 2018
Bibliography to self-study
1 Ch. P. Pfleeger, S. L. Pfleeger Security in Computing, 4th Edition Prentice Hall. 2006
2 Chris Binnie Linux Server : bezpieczeństwo i ochrona sieci Helion. 2017
3 Izabela Oleksiewicz, Waldemar Krztoń Bezpieczeństwo współczesnego społeczeństwa informacyjnego w cyberprzestrzeni / Rambler Press. 2017

Basic requirements in category knowledge/skills/social competences

Formal requirements: The student satisfies the formal requirements set out in the study regulations.

Basic requirements in category knowledge: The student should have knowledge in mathematics, number theory, used to encrypt information and have knowledge about the functioning and management of the computer network and system.

Basic requirements in category skills: The student should be able to use mathematical knowledge to encrypt and decrypt data, operation of algorithms and cryptographic systems.

Basic requirements in category social competences: Ability to work in a team.

Module outcomes

MEK The student who completed the module Types of classes / teaching methods leading to achieving a given outcome of teaching Methods of verifying every mentioned outcome of teaching Relationships with KEK Relationships with PRK
01 Demonstrates how to encrypt the information, authentication, hashing lecture, interactive lecture, laboratory, lab problem. credit part. written, final part. oral, written report K_W06+++
K_U15+
P6S_UW
P6S_WG
02 It explains the principles and methods to encrypt and decrypt information Interactive lecture, laboratory, lab problem credit part. written, final part. oral, written report K_W08++
K_K06+
P6S_KO
P6S_KR
P6S_WG
03 Designs and builds systems with public and private keys Interactive lecture, lecture, laboratory credit part. written, final part. oral, written report K_W11++
K_U19+
P6S_UW
P6S_WK
04 Able to evaluate and adjust the level of system security and computer network to the requirements of security policy lecture, lecture problem, a laboratory problem, seminar credit part. written, final part. oral, written report K_W01+
K_K06+++
P6S_KO
P6S_KR
P6S_WG
05 Correctly interprets and applies the provisions resulting from laws, regulations, standards and regulations, including security policy lecture, problem laboratory written test, project report K_W11++
K_U15+++
P6S_UW
P6S_WK
06 He knows the concept of risk and classifies it correctly. interactive lecture, lecture, problem laboratory, individual project pass the part practical K_W06+
K_U10++
P6S_UW
P6S_WG
07 He can determine the risk of IT systems from the perspective of an audit. lecture, laboratory written report, colloquium K_W06+++
K_U19+
P6S_UW
P6S_WG

Attention: Depending on the epidemic situation, verification of the achieved learning outcomes specified in the study program, in particular credits and examinations at the end of specific classes, can be implemented remotely (real-time meetings).

The syllabus of the module

Sem. TK The content realized in MEK
5 TK01 Introduction. Determining the form of credit and the scope of the material. Basic definitions of security. Risk management. Acts and legal standards. W01 MEK04 MEK06 MEK07
5 TK02 Cryptography. Methods and categories of breaking ciphers. Basic types of ciphers. W02, W03, L01 MEK02 MEK03
5 TK03 Introduction to information theory. Entropy. Coincidence characters. Frequency analysis of ciphers. W04, L02 MEK02 MEK04
5 TK04 Block ciphers and standard DES. Public key cryptography, RSA cipher. W05, L03 MEK01 MEK04
5 TK05 Security policy. Security models. Creating safety procedures. W06, L04 MEK03 MEK05 MEK06
5 TK06 Authentication. Password. The Kerberos. W07, L05, L12 MEK01 MEK02
5 TK07 IDS and IPS systems. The legal aspect, hardware and software solutions. W08, L06 MEK02
5 TK08 Firewalls: Firewalls characteristics, types of firewalls, implement firewalls, location and configuration of firewalls. W09, L07, P 1-15 MEK03 MEK04
5 TK09 Methods and techniques of reconnaissance systems and computer networks. Network scanning techniques. W10, W11, L08, L15, P 1-15 MEK01 MEK03
5 TK10 Digital signature. Safety certificates. Hash functions. W12, L09 MEK01 MEK04
5 TK11 Email security. W13, L10 MEK01 MEK06
5 TK12 Malicious software types of malware, viruses, anti-viruses, worms, distributed denial of service attacks. Anti-virus programs W14, L11, P1-5 MEK04 MEK06
5 TK13 Measures of confidentiality and security systems. Audit of the system. W15, L13, L14, P 1-5 MEK04 MEK07

The student's effort

The type of classes The work before classes The participation in classes The work after classes
Lecture (sem. 5) The preparation for a test: 2.00 hours/sem.
contact hours: 15.00 hours/sem.
complementing/reading through notes: 2.00 hours/sem.
Studying the recommended bibliography: 1.00 hours/sem.
Laboratory (sem. 5) The preparation for a Laboratory: 1.00 hours/sem.
The preparation for a test: 1.00 hours/sem.
contact hours: 15.00 hours/sem.
Finishing/Making the report: 1.00 hours/sem.
Project/Seminar (sem. 5) contact hours: 15.00 hours/sem..
Doing the project/report/ Keeping records: 5.00 hours/sem.
Advice (sem. 5)
Credit (sem. 5)

The way of giving the component module grades and the final grade

The type of classes The way of giving the final grade
Lecture The lecture ends with a credit. The release to pass the course is a positive final evaluation of the laboratory. As part of the lectures, it is planned to implement 3-5 hours in the form of e-learning. The condition for passing this form is passing the checking quiz.
Laboratory The release for the implementation of the laboratory is to provide the teacher to assess reports of previously performed laboratory. To complete the course, complete all the labs. The final evaluation will assess first completion of the test increased or decreased based on assessments of the reports. Gradation ratings 0-50% - 2.0% 51-65 - 3.0, 66-75% - 3.5, 76-84% - 4.0; 85-92% - 4.5, 93-100% - 5.0. The presence of mandatory laboratory.
Project/Seminar
The final grade The final evaluation is the arithmetic mean of the completion of the lecture and laboratory evaluation.

Sample problems

Required during the exam/when receiving the credit
(-)

Realized during classes/laboratories/projects
(-)

Others
(-)

Can a student use any teaching aids during the exam/when receiving the credit : no

The contents of the module are associated with the research profile: no