Subject: Information System Security and Safety (14 - IZOO23)


Basic Information

CategoryTheoretical-methodological
Scientific or art field:Information-Communication Systems
InterdisciplinaryNo
ECTS5
Native organizations units

Course native organizational units not found!
Course specification

Course is active from 07.03.2014..

The aim of this course is gaining insight into basic security principles and methods, safety of information systems, understanding the life cycle of data and requirements in terms of their availability, confidentiality and integrity, and also gaining the ability to identify threats, vulnerabilities and risks in information systems, or in other words, ways to reduce or avoid those risks.
After completing the course, students will master the necessary terminology as well as a significant number of methods, techniques and skills in the field of security and safety of information systems, conforming to good practices and requirements of leading international standards. Also, students will be qualified for individual realization of systems for protection of information systems.
Throughout this course the content that will be covered is as follows: basic concepts, trends in development and application of protection of information systems, identification and classification of information resources, threats and vulnerabilities associated with them, backups – process of creation and their use after a catastrophic event, incidents associated with information safety, cryptography – the concept, purpose and procedures, application of cryptography in order to protect data, safety protocols, security of data in the cloud and protection of personal data.
The lectures include numerous examples and problem scenarios in the domain of security and safety of information systems, analysis of different strategies for information resources protection and their evaluation. Exercises are performed in the laboratory with the help of computers, and during these exercises individual work is encouraged as well as group work in developing and testing various systems for protection of organizations information resources.
AuthorsNameYearPublisherLanguage
Noriswadi Ismail, Edwin Lee CiehBeyond Data Protection: Strategies Case Studies and Practical Guidance2012SpringerEnglish
Gutwirth, S., Poullet, Y., De Hert, P.Computers, Privacy anad Data Protection: an Element of Choice2011SpringerEnglish
Paul LambertA Users Guide to Data Protection2013Bloomsbury ProfessionalEnglish
ISO/IECInformation security management systems Requirements2013ISO/IECEnglish
Course activity Pre-examination ObligationsNumber of points
TestYesYes10.00
TestYesYes10.00
Written part of the exam - tasks and theoryNoYes40.00
Lecture attendanceYesYes5.00
Computer exercise attendanceYesYes5.00
Term paperYesYes20.00
Oral part of the examNoYes10.00
Name and surnameForm of classes
Missing picture!

Sladojević Srđan
Associate Professor

Lectures
Missing picture!

Stefanović Darko
Associate Professor

Lectures
Missing picture!

Arsenović Marko
Assistant - Master

Computational classes
Missing picture!

baji* Angela

Computational classes