UNIVERSITY OF CRIMINAL INVESTIGATION AND POLICE STUDIES

UNDERGRADUATE ACADEMIC STUDIES

INFORMATION TECHNOLOGY

Course:

Data and Information Security

Course Code: 1.42

ECTS: 8

Course Status:

Compulsory

Number of Effective Classes (Per Week): 3 + 2

Theoretical Education:

Practical Training:

Special Forms of Training:

3

2

-

Prerequisite/s: None

Educational Objective: Acquiring knowledge about basic concepts in the field of information security and data protection in computer systems, as well as current legal regulations and standards in this field. Familiarizing with the aim of specific risk reduction controls as well as developing skills in setting up certain security controls.

Projected Outcome: Students are able to understand, apply, and manage information security and data protection procedures from beginning-collection and storage phase, through processing and distribution till its use. Students are able to apply modern technological methods and tools to protect against deliberate or accidental detection, damage, alienation, destruction, but also unauthorized use of data and information.

Course Contents/Structure

Theoretical education: Defining basic concepts of data and information as well as the concepts of security and protection in the context of information systems and networks. Overview of the current state of information security in the country and the world. Principles of protection: Protection facilities; Threats; Consequences; Controles; Protection policy. Layered protection. The notion of the emergence and development of computer crime, forms and perpetrators. Detection, clarification and proofing. Risk analysis and assessment, controls selection. An accident recovery plan. Organizational, logical, technical and physical controls. Data security during processing and storage: security at the operating system level, application-level protection. Cryptography protection, PKI. Information security standards and certification programs. Database security. Network security. Incident detection and reaction.

Practical training: Analysis of basic protection systems. Application of hardware and software solutions for information security.

Teaching Methods: Lectures, exercises, laboratory exercises, projects, midterm test, consultations, seminar papers, case study, exam.

Assessment (Maximum Number of Points: 100)

Pre-Exam Obligations

No. of Points

Final Examination

No. of Points

Active participation in classes

5

Exam with practical problems and theoretical questions

40

Practical training

15

 

 

Mid Term test(s)

20

 

 

Research paper/study

20

 

 

Textbook/s

1. Pleskonjić, D.; Maček, N.,Đorđević, B.; Carić, M. Sigurnost računarskih sistema i mreža. Beograd, Mikro knjiga, 2007

2. Boyle, R. Applied information security. Boston, Prentice Hall, 2010

3. Петровић, С. Компјутерски криминал. Београд, Министарство унутрашњих послова Републике Србије, 2001

4. Schneier, B. Primenjena kriptografija:protokoli, algoritmi i izvorni kod na jeziku C. Beograd, Mikro knjiga, 2007