Protection and Security of Information Systems

Course Description

The objective of the course is to get to know the principles of information security, risks and threats to information systems, methods of their protection, and procedures for measuring, evaluating and certifying the achieved level of information security. In order to implement this content, procedures and methods for risk assessment, management and control that breach the confidentiality, integrity and availability of information systems are considered. Mathematical models of safety, as well as models of safety management and control of process flows are specially elaborated as a basis for realization of safety mechanisms. A considerable part of the material is devoted to cryptography, cryptographic protocols, techniques and algorithms. Security mechanisms and security architecture related to databases, operating systems, transaction systems, multilevel computer networks, distributed databases and e-business systems, as well as standards, procedures for building and evaluating confidential systems are discussed.

Learning Outcomes

  1. assess information security risks
  2. explain technical, organizational and human factors that are related to information security risks
  3. explain application of norms to establish information security
  4. define threats, vulnerabilities and attack that threaten informtion systems and the organization
  5. explain analysis and application of technological solutions to build information security architecture
  6. explain ways to establish and maintain information system management system
  7. assess influence of security policies, legal framework, compliance requirements and market development on complex systems and organization mission
  8. To get the know the methods for database security.
  9. To get to know the methods for protection and security of e-business systems.

Forms of Teaching


2 hours a week

Week by Week Schedule

  1. Information system security management
  2. Information system security management
  3. Information system security standards
  4. Information system security standards
  5. Secure development life-cycle
  6. IS risk analysis and management
  7. Threat modelling
  8. Midterm exam
  9. Contingency and continuity planning
  10. Database Security
  11. Database security
  12. IS auditing
  13. Electronic business security
  14. Legal and ethical issues
  15. Final exam

Study Programmes

University graduate
Audio Technologies and Electroacoustics (profile)
Free Elective Courses (1. semester)
Communication and Space Technologies (profile)
Free Elective Courses (1. semester)
Computational Modelling in Engineering (profile)
Free Elective Courses (1. semester)
Computer Engineering (profile)
Elective Course of the Profile (1. semester) Specialization Course (1. semester) (3. semester)
Computer Science (profile)
Free Elective Courses (1. semester)
Control Systems and Robotics (profile)
Free Elective Courses (1. semester)
Data Science (profile)
Free Elective Courses (1. semester)
Electrical Power Engineering (profile)
Free Elective Courses (1. semester)
Electric Machines, Drives and Automation (profile)
Free Elective Courses (1. semester)
Electronic and Computer Engineering (profile)
Free Elective Courses (1. semester)
Electronics (profile)
Free Elective Courses (1. semester)
Information and Communication Engineering (profile)
Free Elective Courses (1. semester)
Information Processing (profile)
Specialization Course (1. semester) (3. semester)
Network Science (profile)
Elective Courses of the Profile (1. semester)
Software Engineering and Information Systems (profile)
Elective Course of the Profile (1. semester) Specialization Course (1. semester) (3. semester)


Tipton, Harold F., and Micki Krause Nozaki (2007.), Information security management handbook, CRC press
S. Castano, M.G. Fugini, G. Martella, P. Samarati (1995.), Database Security, ACM Press

Associate Lecturers

For students


ID 223741
  Winter semester
L3 English Level
L1 e-Learning
30 Lectures

Grading System

Very Good