Information security

This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks. Interest in information security has been spurred by the pervasive use of computer-based applications such as information systems, databases, and the Internet. Information security has also emerged as a national goal with national defense and homeland security implications. Information security is enabled through securing data, computers, and networks. In this course, we will look into such topics as fundamentals of information security, computer security technology and principles, access control mechanisms, cryptography algorithms, software security, physical security, and security management and risk assessment.

What will students learn?

During study at the university, students learn how to secure information in modern information and telecommunication systems.

They are taught:

  • how to protect personal computers and networks from viruses, Trojan horses, worms and other malware programs,
  • how to stop hackers trying to get access to financial, commercial, personal and other restricted information, building of secure and reliable servers and networks.
Students learn different encryption, digital signatures and other cryptographic methods, obtaining knowledge on best ciphers all over the world. Besides it, they master technologies for protection from hidden radio microphones and video cameras at government and commercial offices, remote information gathering via infrared lasers, powerful antennas and other modern tools of technical intelligence. Students study mobile phones security and are able to estimate the level of trust to different types of wireless networks with the chosen set of tools. Additionally, students study international requirements and standards for information security systems.

Careers oportunities

Information security analysts plan and carry out security measures to protect an organization's computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increase. They bring business and information technology (IT) together by understanding the needs and limitations of both.

Most analysts work for computer companies, consulting firms, and business and financial companies. Many information security analysts work with other members of an information technology department, such as network administrators or computer systems analysts.

-->