University of Warsaw - Central Authentication System
Strona główna

IT security

General data

Course ID: 2700-L-LM-D5BEZP-LMM
Erasmus code / ISCED: 15.1 Kod klasyfikacyjny przedmiotu składa się z trzech do pięciu cyfr, przy czym trzy pierwsze oznaczają klasyfikację dziedziny wg. Listy kodów dziedzin obowiązującej w programie Socrates/Erasmus, czwarta (dotąd na ogół 0) – ewentualne uszczegółowienie informacji o dyscyplinie, piąta – stopień zaawansowania przedmiotu ustalony na podstawie roku studiów, dla którego przedmiot jest przeznaczony. / (0321) Journalism and reporting The ISCED (International Standard Classification of Education) code has been designed by UNESCO.
Course title: IT security
Name in Polish: Bezpieczeństwo IT
Organizational unit: Faculty of Journalism, Information and Book Studies
Course groups:
Course homepage: https://kampus-student2.ckc.uw.edu.pl/course/view.php?id=3722
ECTS credit allocation (and other scores): (not available) Basic information on ECTS credits allocation principles:
  • the annual hourly workload of the student’s work required to achieve the expected learning outcomes for a given stage is 1500-1800h, corresponding to 60 ECTS;
  • the student’s weekly hourly workload is 45 h;
  • 1 ECTS point corresponds to 25-30 hours of student work needed to achieve the assumed learning outcomes;
  • weekly student workload necessary to achieve the assumed learning outcomes allows to obtain 1.5 ECTS;
  • work required to pass the course, which has been assigned 3 ECTS, constitutes 10% of the semester student load.

view allocation of credits
Language: Polish
Main fields of studies for MISMaP:

computer science

Type of course:

elective monographs
obligatory courses

Prerequisites (description):

The aim of the course is to acquaint students with the state and conditions for development of IT security.

Mode:

Remote learning

Short description:

The aim of the course is to acquaint students with the state and security conditions for development of a media institution. In particular the lecture includes: the issue of IT security institution, organization of information protection on the example of classified information, the handling of valuable company resources in emergency situations and emergency and model security procedures in the institution.

Full description:

1. Computer security institutions

2. Status and conditions of IT security

3. Trends in IT security

4. The categories of offenses IT

5. The market for IT security

6. The evolution of safety systems

7. Main areas related to IT security

8. Sources of danger

9. IT security rules

10. viruses - malware

A. Hazard Classification

B. Methods defense

11. Components of IT security

A. Reliability of IT systems, BCP

B Cryptography

C. Physical security - means and methods,

D. Organizational and personnel security,

E. Safe structured cabling,

F. Electromagnetic Protection,

G. Access control and authentication,

H. Electronic Signature

I. The essence of the firewall system IT security

J. Identification - methods and tools

K. Digital Wireless Security

L. Security Policy

M. Specific Security Requirements ICT.

N. Examples of integrated security systems with IT systems - identity management systems,

A. Backup,

P. mechanisms to control content information.

12. Organization of safeguarding information at the example of classified information

13. Sharing information and control their circulation

14. Protection of information:

a) Western standards,

b) The Polish conditions.

15. Disposal valuable company resources in emergencies and emergency situations:

a) preparatory,

b) the valuable resources of the company,

c) the management plan - plans,

d) replacement strategies.

e) testing business continuity plans.

f) to maintain and update plans

g) the procedure for liquidation of the company with valuable information assets.

16. Model security procedures in the institution:

a) the introduction,

b) the procedure for the safety of personnel,

c) the procedure for making the employees protected resources of the company,

d) the procedure for physical security,

e) the procedure IT security.

Bibliography:

1. A. Gałach, Zarządzanie bezpieczeństwem systemu informatycznego – uniwersalna lista kontrolna, Gdańsk, 2004.

2. Gogołek W., Informatyka dla humanistów, Wyd kropki trzy, Warszawa2012.

3. http://gogolek.pl/Prezentacje%20PI.html

Learning outcomes:

Supplementing the knowledge of the basics of computer science to the extent necessary to understand the problems of IT security and the security of information resources of the institution. Getting to know the basic conditions and the contemporary challenges of IT security (BTI). To learn the basic threats and how to defend themselves in enterprises of all sizes. Understanding the principles of security policy design and specific safety requirements ICT and Procedures for the Safe Operation.

Assessment methods and assessment criteria:

Project realization - 75%

Attendance - 25%

Practical placement:

Lack-of

This course is not currently offered.
Course descriptions are protected by copyright.
Copyright by University of Warsaw.
Krakowskie Przedmieście 26/28
00-927 Warszawa
tel: +48 22 55 20 000 https://uw.edu.pl/
contact accessibility statement USOSweb 7.0.3.0 (2024-03-22)