Module Name: |
Module 11: Information Protection and Neurocomputer Systems |
Code |
M11IS(Ma) |
Module Elements |
Elective Information Protection Methods/Information Security Neurocomputing Systems/ Applied Fuzzy Systems |
Semester Number: |
1 |
Person responsible for the module: |
Y.V. Kukharenko |
Lecturer: |
Information Protection Methods – Y.V. Kukharenko Information Security – Y.V. Kukharenko Neurocomputing Systems – V.P. Kulikov Applied Fuzzy Systems – N.V. Astapenko |
Language: |
Russian |
Curriculum relation: |
Information Systems (Ma) |
Type of teaching / number of hours per week and per semester : |
Full-time: 1 semester: hours per week –18 (lectures -2; workshops -1; labs-6; independent work of students -9); hours per semester – 270. |
Workload: |
Full-time education: Teaching Load: 135hours Extracurricular Classes: 135hours Total: 270hours |
Credit Points: |
9ECTS |
Conditions for Examinations: |
For admission to the exam, the student must score at least 50 points out of 100 available for each subject of the module |
Recommended Conditions: |
This module is based on the knowledge gained in the course of the following undergraduate subjects: IP analysis, modeling and design Analysis, Simulation and Design of Information Systems |
Expected Learning Outcomes: |
Knowledge: means of protection, standards of evaluation of security level and major software vulnerabilities, basic concepts of information security and information protection; sources, risks, forms of attacks on information; security policy and standards; methods of software reliability; legal and organizational support of software development and application, basics of the theory of fuzzy sets and practical results of the use of fuzzy technologies for processing semi-structured information to determine effective solutions; terminology related to neural networks; architecture of neural networks. Skills: to implement measures to fight network security violations using a variety of software, install, test, try and use hardware and software protection; to implement measures to fight network security violations using a variety of software protection; install and configure software to protect against malicious software, to apply the obtained theoretical knowledge to solving practical problems of neural network simulation in economic applications; to apply the obtained theoretical knowledge to solving practical problems of neural network simulation in financial applications; to use the basic principles of solving problems of economic analysis, classification, forecasting and management using neural networks. Abilities: security administration, identifying and eliminating software vulnerabilities, analysis of information security; administration of security software; skills to identify and resolve software vulnerabilities. to professional operation of modern equipment and devices, knowledge of optimization methods and the ability to apply them in solving problems of professional activity, apply the basic principles of solving problems of economic analysis, classification, forecasting and management using neural networks, willingness to use knowledge and understanding for the design and implementation of information models, systems and processes. |
Intendend use/applicability |
Modules: Mathematical Simulation in Information System |
Content: |
Information market: features of formation and development. Formation of the information industry. Information as commodity. Features of pricing for information products. Main methods of determining the cost of information security. Determination of the amount of reasonable costs to ensure the security of information. Economic evaluation of intellectual property. Models of information security systems. General model of information security process. Generalized system model of information security. Generalized methods of information protection.
|
Examination Form, module mark: |
Examination of the Module: Information Protection Methods /Information Security - written control examination Neurocomputing Systems/ Applied Fuzzy Systems - written control examination Module mark: the result of the exam Neurocomputing Systems/ Applied Fuzzy Systems |
Technical/Multimedia Facilities: |
Interactive whiteboard, multimedia system, IT room. |
Study Materials: |
1. V. F. Shangin Protection of Computer Information. Effective Methods and Means. – M: DMK Press, 2012. 2. A.V. Vasilkov, I. A. Vasilkov. Security and Access Control in Information Systems.- M: FORUM, 2012 3. Ensuring Information Security. Edited by A. P. Kurilo. M. Alpin, 2011 4. B. Schneier. Secrets and Lies. Data Security in the Digital World. Publishing House: Piter, 2003 ISBN: 5-318-00193-9, 0-471-25311-1 5. Practical Cryptography.Niels Ferguson, Bruce Schneier,Publishing House: Williams, 2005, ISBN: 5-8459-0733-0, 0-4712-2357-3 6. Basics of Information Security. Textbook for high schools / by Y. B. Belov, V. P. Los, R. V. Mescheryakov, A. A. Shelupanov. – M: Goryachaya liniya – Telekom, 2006. – 544 p.: with pictures. 7. Gulnara Yakhyaeva. Fuzzy Sets and Neural Networks. Internet University of Information Technologies, 2011 8. Alexander Galushkin. Neural Networks. Basics of the Theory. Goryachaya liniya - Telekom ISBN 978-5-9912-0082-0; 2012 9. Ryszard Tadeusiewicz, Barbara Borovik, Tomas Gonzak, Bartos Lepper. Elementary Introduction to Neural Networks with Examples of Programs(translated by Igor Rudinskiy). Goryachaya liniya - Telekom ISBN 978-5-9912-0163-6; 2011
|
Date of last amendment |
20.01.2020 |