• A
  • A
  • A
  • АБB
  • АБB
  • АБB
  • А
  • А
  • А
  • А
  • А
Обычная версия сайта
Статья
Применение технологии Process Mining в управлении цепями поставок

Воронова А. П., Заходякин Г. В.

Логистика и управление цепями поставок. 2020. № 6(101). С. 26-36.

Глава в книге
Conceptual Framework of Agent-based Model of Relational Conflicts in Russian Retail

Morozova Y. A.

In bk.: Proceedings of Analytics for Management and Economics Conference AMEC 2019. St. Petersburg: 2019. P. 367-373.

Information Security

2019/2020
Учебный год
ENG
Обучение ведется на английском языке
5
Кредиты
Статус:
Курс по выбору
Когда читается:
4-й курс, 3 модуль

Course Syllabus

Abstract

In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. After completing the course you will have gained an awareness of key information security principles regarding information, confidentiality, integrity and availability. You will be able to explain some of the key aspects of information risk and security management, in addition, summarise some of the key aspects in computer and network security, including some appreciation of threats, attacks, exploits and vulnerabilities. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry.
Learning Objectives

Learning Objectives

  • The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals.
Expected Learning Outcomes

Expected Learning Outcomes

  • Gained skills like cybersecurity, cryptography, security management ind information security (INFOSEC)
Course Contents

Course Contents

  • Information Security: Context and Introduction
    Introduction to Information Security. Introduction to Cryptography. Network and Computer Security. Security Management. The Cyber Security Industry and Careers
Assessment Elements

Assessment Elements

  • non-blocking Tests during the course
  • non-blocking Final exam
Interim Assessment

Interim Assessment

  • Interim assessment (3 module)
    0.7 * Final exam + 0.3 * Tests during the course
Bibliography

Bibliography

Recommended Core Bibliography

  • Awad, A. I., & Fairhurst, M. C. (2018). Information Security : Foundations, Technologies and Applications. London, United Kingdom: The Institution of Engineering and Technology. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsebk&AN=1805102

Recommended Additional Bibliography

  • Ștefănescu, C., Comănescu, L. E., Buhuși, C., & Bîlcan, G. A. (2019). Theoretical Approaches to Estimate the Information Security Risks. Academic Journal of Economic Studies, 5(3), 120–125. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=bsu&AN=138862162