IT security
General data
Course ID: | 2700-L-LM-D5BEZP-LMM |
Erasmus code / ISCED: |
15.1
|
Course title: | IT security |
Name in Polish: | Bezpieczeństwo IT |
Organizational unit: | Faculty of Journalism, Information and Book Studies |
Course groups: | |
Course homepage: | https://kampus-student2.ckc.uw.edu.pl/course/view.php?id=3722 |
ECTS credit allocation (and other scores): |
(not available)
|
Language: | Polish |
Main fields of studies for MISMaP: | computer science |
Type of course: | elective monographs |
Prerequisites (description): | The aim of the course is to acquaint students with the state and conditions for development of IT security. |
Mode: | Remote learning |
Short description: |
The aim of the course is to acquaint students with the state and security conditions for development of a media institution. In particular the lecture includes: the issue of IT security institution, organization of information protection on the example of classified information, the handling of valuable company resources in emergency situations and emergency and model security procedures in the institution. |
Full description: |
1. Computer security institutions 2. Status and conditions of IT security 3. Trends in IT security 4. The categories of offenses IT 5. The market for IT security 6. The evolution of safety systems 7. Main areas related to IT security 8. Sources of danger 9. IT security rules 10. viruses - malware A. Hazard Classification B. Methods defense 11. Components of IT security A. Reliability of IT systems, BCP B Cryptography C. Physical security - means and methods, D. Organizational and personnel security, E. Safe structured cabling, F. Electromagnetic Protection, G. Access control and authentication, H. Electronic Signature I. The essence of the firewall system IT security J. Identification - methods and tools K. Digital Wireless Security L. Security Policy M. Specific Security Requirements ICT. N. Examples of integrated security systems with IT systems - identity management systems, A. Backup, P. mechanisms to control content information. 12. Organization of safeguarding information at the example of classified information 13. Sharing information and control their circulation 14. Protection of information: a) Western standards, b) The Polish conditions. 15. Disposal valuable company resources in emergencies and emergency situations: a) preparatory, b) the valuable resources of the company, c) the management plan - plans, d) replacement strategies. e) testing business continuity plans. f) to maintain and update plans g) the procedure for liquidation of the company with valuable information assets. 16. Model security procedures in the institution: a) the introduction, b) the procedure for the safety of personnel, c) the procedure for making the employees protected resources of the company, d) the procedure for physical security, e) the procedure IT security. |
Bibliography: |
1. A. Gałach, Zarządzanie bezpieczeństwem systemu informatycznego – uniwersalna lista kontrolna, Gdańsk, 2004. 2. Gogołek W., Informatyka dla humanistów, Wyd kropki trzy, Warszawa2012. 3. http://gogolek.pl/Prezentacje%20PI.html |
Learning outcomes: |
Supplementing the knowledge of the basics of computer science to the extent necessary to understand the problems of IT security and the security of information resources of the institution. Getting to know the basic conditions and the contemporary challenges of IT security (BTI). To learn the basic threats and how to defend themselves in enterprises of all sizes. Understanding the principles of security policy design and specific safety requirements ICT and Procedures for the Safe Operation. |
Assessment methods and assessment criteria: |
Project realization - 75% Attendance - 25% |
Practical placement: |
Lack-of |
Copyright by University of Warsaw.