Course code InfTB002

Credit points 2

Security of Information Systems and Data II

Total Hours in Course40

Number of hours for lectures0

Number of hours for seminars and practical classes0

Number of hours for laboratory classes0

Independent study hours54

Date of course confirmation13.12.2023

Responsible UnitInstitute of Computer Systems and Data Science

Course developers

author prof.

Pēteris Rivža

Dr. habil. sc. ing.

author lect.

Nauris Pauliņš

Mg. sc. ing.

Prior knowledge

InfT3041, Security of Information Systems and Data I

Replaced course

InfT3042 [GINT3042] Security of Information Systems and Data II

Course abstract

The aim of the second part of the course is to obtain generally accepted principles and examples of good practice for information protection in computer networks and information systems. During the course, students learn to create a full-fledged information security policy in the company, identify information security risks and apply appropriate protection measures. Students also learn to identify vulnerabilities in the operation of computer networks and their protection systems. Effective methods of protection against computer network attacks are discussed in depth.

Learning outcomes and their assessment

As a result of mastering the course students:
• know the topics covered in information security management, the necessary mechanisms for successful information security management, the existing risks and methods for their identification.
• are able to establish and maintain security management in the organization in accordance with regulatory enactments and standards, to identify and manage information security risks, to detect and respond to intruders in the computer network, to use basic information security tools in practice;
• are able to work in a group or to work independently, to use information protection methods and tools, as well as to persuade participants and argue their opinion.Course job, defending course work.

Course Content(Calendar)

Full-time studies:
1. Basic principles and basic steps of information systems protection.
2. Regulation of regulatory enactments and good practice in information security.
3. Classification of information systems and information resources
4. Information system risk identification and risk management.
5. Elements of information systems security policy and ensuring business continuity.
6. Computer network security organization and vulnerability analysis.
7. Physical protection requirements in organizations, incident management.
8. Specifics of security of development and maintenance of web information systems.

Part-time studies:
All topics specified for full-time studies are implemented, but the number of contact hours is 1/2 of the specified number of hours

Requirements for awarding credit points

Course work

Description of the organization and tasks of students’ independent work

The student chooses a geoinformation system, conducts in-depth research, performs risk analysis and develops complex system protection, including security policy, security regulations, methods, algorithms, software, hardware and personnel requirements.

Criteria for Evaluating Learning Outcomes

Practically developed, written and defended course work on the complex protection of geoinformation systems and data.
The course work is evaluated on a 10-point scale.

Compulsory reading

1. Whitman M.E., Mattord H.J. Management of Information Security. 6th Edition. Boston: Cengage Learning, 2018 2019., 728 p.
2. Tipon H., Krause M. Information Security Management Handbook. Boca Raton [etc.] : Auerbach Publications, 2007.
3. Stallings W. Cryptography and Network Security: principles and practices. Seventh Edition. Upper Saddle River, New Jersey: Pearson Education, 2016.
Stallings W. Cryptography and network security: principles and practices. 4th ed. Pearson International ed. Upper Saddle River, New Jersey: Pearson Education, 2006. 680 p.
4. Vacca J.R. Computer and Information Security: Handbook. Amsterdam; Boston: Elsevier; Burlington, MA: Morgan Kaufmann, 2009. 844 p.

Further reading

1. Manzuik Steve. Network security assessment: [elektronisks resurss] from vulnerability to patch. Rockland, MA : Syngress Pub., 2007. 372 p.
2. Bolstad P. GIS Fundamentals: A First Text on Geographic Information Systems., Sixth Edition., XanEdu Publishing Inc, 2019., 764

Periodicals and other sources

Technical Resource and Course Web Site for Cryptography and Network Security. [Skatīts 04.10.2020] Pieejams: http://www.williamstallings.com/Crypto3e.html

Notes

Professional higher education bachelor study program “Geoinformatics and Remote Sensing” in full-time and part-time studies.