Information Security of Automated Systems: Development of Automated Systems in the Protected Version

Degree: SPECIALIST
Duration: 5,5 years (11 semesters)
ECTS: 330
Fields of study: Information Security, Automated Systems
Languages of instruction: Russian, English (on request)

DESCRIPTION

A graduate who has successfully completed the program represents a high-level specialist in the field of information security, ready to solve the tasks of professional activity in research, design, control and analytical, organisational, managerial and operational types of activities. A specialist in this specialty is called upon to protect the interests of the individual, society and the state in the information sphere, to introduce acquired knowledge and culture into professional practice. A specialist in this specialty should have a broad university-level outlook and appropriate professional training in order to be ready to independently solve design and practical tasks in the face of new socio-economic challenges and the constant transformation of legal, moral, cultural and everyday orientations of the population.

AIMS

research activity:
•    conducting research and development work in the field of developing security means and systems to protect communication means of telecommunication networks from unauthorised access, building secure telecommunication systems.

control and analytical activity:
•    certifying computing facilities for compliance with requirements of information security;
•    certifying allocated (protected) facilities for compliance with requirements of information security.

organisational and management activity:
•    managing relations with regulators in the field of information protection.

operational activity:
•    conducting the monitoring of security of computer systems and networks;
•    supporting information security systems during operation.

design activity:
•    developing software and hardware for information security systems in automated systems;
•    developing design solutions for information security in automated systems.

LEARNING OUTCOMES

On successful completion of the course the student should be able to:
•    develop software and technical means for automated systems, taking into account the requirements of information security;
•    develop design solutions and formalise requirements for information protection in automated systems;
•    identify information security threats and technical channels of information leakage, certify computing facilities for compliance with requirements of information security;
•    identify information security threats and technical channels of information leakage, certify allocated (protected) premises for compliance with requirements of information security;
•    assess automated system information security;
•    apply security scanners and tools of automatic response to attempts of unauthorised access for monitoring and analysing automated system security;
•    cooperate with authorised federal executive authorities during the implementation of licensing, attestation, and certification in accordance with the requirements of regulatory acts, guidance and methodological documents;
•    apply means of identification and automatic response to attempts of unauthorised access to telecommunication system resources;
•    apply and support information security systems;
•    organise research and development work for building means and systems of telecommunication system security.

EMPLOYMENT OPPORTUNITIES

Graduates of this program can find employment in various fields, including education and research, where they can contribute to scientific advancements. They may also work in the information and communication technology sector, specifically focusing on information security in automated systems. Additionally, they can engage in roles within organisations that specialise in protecting technological resources and ensuring the security of information within automated systems.

Дата создания: 14.03.2025 14:32
Дата обновления: 14.03.2025 14:32