Course code InfT5038

Credit points 2

Information Security

Total Hours in Course80

Number of hours for lectures12

Number of hours for seminars and practical classes12

Independent study hours56

Date of course confirmation12.01.2016

Responsible UnitDepartment of Computer Systems

Course developers

author prof.

Pēteris Rivža

Dr. habil. sc. ing.

author lect.

Nauris Pauliņš

Mg. sc. ing.

Course abstract

This course covers accepted principles and best practices for information security in computer networks and information systems. During the course students learn how to develop complete policy in information security for business organizations, identify information security risks and how to apply appropriate protection mechanisms. Students learn to identify vulnerabilities in computer networks and protection systems. Extra attention is covered on effective methods to protect against computer network intrusions.

Learning outcomes and their assessment

• Knowledge about included topics of information security management, about mechanisms to develop successful information security management, understand how to provide information security risk management.
• Skills to establish and maintain information security management in organization, provide security risk identification and management, detect and respond to intruders in computer network, be able practically use main tools of information security.
• Competence to solve problems individually and in working group, be able to choose correct tools and methods for information security in particular situation, and also to convince other participants and argue their opinion.

Compulsory reading

1. Tipon H., Krause M. Information security Management Handbook. Boca Raton [etc.] : Auerbach Publications, 2007. (RTU: Centrālā bibliotēka). Nav LLU FB. Ir ALEPH Kopkatalogā.
2. William Stallings. Cryptography and Network Security: principles and practices. Upper Saddle River, New Jersy: Person Education, 2006. 680 p.
3. Peltier T.R. Information security policies, procedures and standarts: guidelines for effective information security management. Boca Raton: Auerbach Publications, 2002. 297 p.
4. Vacca J.R. Computer and Information Security: Handbook. Amsterdam ; Boston : Elsevier ; Burlington, MA : Morgan Kaufmann, 2009. 844 p.

Further reading

1. Manzuik Steve. Network security assessment: [elektronisks resurss] from vulnerability to patch. Rockland, MA : Syngress Pub., 2007. 372 p.
2. Дикарев В.И. Защита объектов и информации от несанкционированного доступа. Санкт-Петербург : Издательство Стройиздат СПб, 2004. 318 c.