Module 23: Information Protection, Software and Network Engineering (Elective Module 5, EM5) |
|
Code |
M23IS(Ba) |
Module Elements |
Elective Subjects Operating Systems and System Programming |
Semester Number: |
5, 6 |
Person responsible for the module |
I.R. Kasimov |
Lecturer: |
Operating Systems and System Programming – I.R. Kasimov |
Language: |
Russian, Kazakh |
Curriculum relation: |
Information Systems (Ba) |
Type of teaching / number of hours per week and per semester : |
5 semester: hours per week – 40 (lectures -3; workshops -1; labs-10; independent work of students -26); hours per semester – 600. 6 semester: hours per week – 20 (lectures -2; workshops -1; labs-3; independent work of students -14); hours per semester – 300 |
Workload: |
Teaching Load: 200 hours |
Credit Points: |
26 ECTS |
Conditions for Examinations: |
For admission to the exam, the student must score at least 50 points out of 100 available for the subject |
Recommended Conditions: |
This module is based on the knowledge gained by students in the course of previous undergraduate subjects: Information and Communication Technologies, IT-Infrastructure, Basics of the Profession, Profound Language Learning. Operating Systems and System Programming, System and Application Software, Profound Language Learning |
Expected Learning Outcomes: |
Know: the OS structure, planning, management, deployment, including Shell options; data security issues, interaction with global and local resources, disk systems; information exchange standards in networks, methods of network configuration and testing. Know: the basic definitions and concepts of Web-design and Web-programming, the basic techniques of creating and promoting sites; the main hardware components of the computer graphics station, their general characteristics; types of computer graphics, their applications; main features and characteristics of computer graphics software. Know modern methods of processing, transformation and protection of information in modern computer systems; modern methods of combating unauthorized blocking, access, copying, modification and collection of information.Know the features of developing threat models and intruder models in distributed information systems, the most common automated systems for working in distributed information systems and the features of their functioning Be able to: develop and promote problem-oriented Web resources; apply methods of design, development and marketing of problem-oriented Web-resources; create raster and vector images; create three-dimensional images. Be able to use Shell languages, registry management tools and policies to solve OS configuration problems; configure the user's network workstation, configure network equipment settings. Be able to use the basic principles, methods and algorithms of operation of software systems for collecting, closing, restoring and authenticating information.Be able to model threats in distributed information systems, make an informed choice and presentation of automated systems to solve specific problems in distributed information systems, taking into account information security requirements. Possess the skills to use the function from the point of view of a user, administrator, programmer and designer; use the skills to organize local networks of different topologies Possess the skills of: design, development and marketing of problem-oriented Web-resources; work with graphic libraries and modern graphic packages and systems. Possess the skills of understanding information technologies and ensuring their safety. Possess practical skills of searching for information leaks andharmful impact in distributed information systems, skills in automated systems serving distributed information systems. Demonstrate the ability to gain insight into the concept of operating systems; understanding the manipulation of memory, threads, processes, software synchronization and virtualization tools; manipulating the parameters of program access to the network. Demonstrate the ability to: understanding the problems, trends and prospects of Web-design and Web programming; knowledge of raster, vector, fractal graphics, mathematical foundations of machine graphics, two dimensional, three-dimensional transformations and projections. Demonstrate the ability to manage information resource. |
Intendend use/applicability |
Modules: Artificial Intelligence Systems |
Content: |
1. Operating Systems and System Programming Mastering the knowledge and skills of using modern software, familiarization with effective algorithms for solving various scientific and technical problems. The subject is devoted to teaching students the structure of a computer system, the concept, the development evolution, functions, approaches to the construction of the OS, the concept, state, model of processes representation, operations performed on them; file structure, organization and access to files; composition and concept, main components of the system software, general description of the ASM language, data types, design programs, command recording formats, compilation, modular design, assembly and addressing modes. 2.System and Application Software Understanding the operation of the OS at the level of manipulation of processes and threads, using the capabilities of the shell OS, API OS, BIOS, UEFI and application software. The subject is devoted to teaching students the structure of a computer system, the concept, the development evolution, functions, approaches to the OS construction, the concept, state, model of processes representation, operations performed; file structure, organization and access to files; composition and concept, and main components of the system software, general description of the ASM language, data types, design programs, command recording formats, compilation, modular design, assembly and addressing modes. 3.Computer Networks Mastering the principles of organization and functioning of computer networks, features of the personal computer in networks. 4.Information Transmission Systems and Networks Classification of topological elements in the networks. Methods of access to the transmission medium. The basic model of the organization of open systems interaction (OSI model). Operating systems of peer-to-peer computer networks. Network operating systems with dedicated server. 5.WEB-Programming Web-Programming is designed to promote students ' familiarity with computer telecommunications and possible approaches to the development of hypertext documents intended for publication in the global computer network of Internet. Training in the development of Web-pages on the basis of an integrated approach; training in Internet programming on the client and server side; training in the use of databases in the development of Web-projects; training in methods of marketing on the Internet, advertising and promotion of developed Internet-resources. 6.Client-Server Applications Designing Principles of development of Internet applications. Basics of site building (introduction to the technology of creating web sites, HTML language). Principles of database design. Methods of connecting Internet pages to the developed database. 7.Graphic Means of Information Systems Basics of working with graphic devices. Basic algorithms of computational geometry and computer graphics. Principles of use of modern graphic systems. Mastering the principles of computer graphics. 8.Information Technologies of Visualization Types of computer graphics. Graphic editors. Basics of working with graphic devices. Basic algorithms of computational geometry and computer graphics. Principles of use of modern graphic systems. Mastering the principles of computer graphics, as well as the current state and prospects for the development of interactive computer graphics. 9. Information Security Information Protection Principles, methods and means of implementing data protection. Protection of information in information systems. The current state of the problem of storage, processing, search, transmission, transformation, closure and recovery of confidential information in organizations and enterprises of various activities and different forms of ownership. Methods of protection against unauthorized access. 10. IT security of distributed IS The concept of a distributed system. Advantages and disadvantagesdistributed systems. Scalability. Transparency. integrity and replication. Hardware and software for building distributed systems. Distributed databases. Data integrity. Location transparency. Processing of distributed requests. Organization of a secure communication channel between the client and the server. Basic network security mechanisms. Identification and authentication. Logging and auditing. Message integrity and confidentiality |
Examination Form, module mark: |
Comprehensive module examination including: Operating Systems and System Programming / System and Application Software – written examination |
Technical/Multimedia Facilities: |
Multimedia System. |
Study Materials: |
|
Date of last amendment |
20.01.2023 |
The expected result is according to the module communication matrix, when passing Module 23 of the educational program "Information Systems"
LO2: | Know theoretical and experimental research methods, in order to create new promising areas in the field of computer science. |
LO3: | Possess skills of using application software packages for calculations, simulation and automation of information processes and systems design. |
LO4: | Possess methods of analysis and evaluation of the effectiveness of information system development, implementation and operation, make technical documentation for the developed information system. |
LO9: | Work with equipment and software-hardware complexes of information systems |
LO10: | Design information systems and their elements in specific areas and adapt the applications to the operating conditions; ensure the security and integrity of data information systems; maintain the performance of information systems according to the specified functional properties; elaborate instructions for the operation of information systems. |