Software Means of Information Protection (SMoIP) ENG
Abstract
Software Means of Information Protection.
The purpose of study: to provide theoretical and practical training necessary for students to obtain basic information about modern information security technologies and their purposeful use for security of computer systems and networks, to gain knowledge and skills of practical use of methods and algorithms of information protection, to provide knowledge about design of security systems and components of information security, principles of construction of a complex of hardware and software protection, methods and means of control and testing of separate components and security system as a whole, and also for studying of a number of the following disciplines and performance of diploma designing.
List of main topics: Information security. Systems for means of protection. Operating system protection. Signs of malware. Analysis of unauthorized access protection systems. Computer virology. Copy protection systems. Protection of optical media. Protection against unauthorized access. Cryptography. Symmetric cryptographic systems. Stream algorithms. Block algorithms. Public key systems. Cryptanalysis of encryption algorithms. Steganography. Information protection in networks.
The discipline consists of two modules: Information protection systems (1) and Cryptography. Steganography. Computer network protection (2).
List of Exam Questions
Analysis of possible channels of information leakage stored in the computer system. Classification of possible channels of information leakage in the computer system. The model of the violator.
Operating system protection. Protection components. System data security.
Signs of malware. Security of system and office programs. Implementation of access delimitation system functions.
Analysis of unauthorized access protection systems. Information protection systems. Requirements for access distribution systems. Password protection.
Computer virology. Principles of computer viruses. Classification of computer viruses. Technology of application of means of protection against viruses.
Copy protection systems. Technical information. Write and read disk sectors. Available disk areas. Hard disk protection. Delimiting access to disk space. Information recovery method. Methods of complete destruction of information on media.
Protection of optical media. Features of optical drives. Physical and information structure of optical disks. CD and DVD protection. Applying non-copy marks. Construction of twin sectors. Defining and joining the uniqueness of the disk topology. Security technologies: AACS, HDCP, MMC, CSS, RPC, SafeDisc, StarForce.
Security features based on the motherboard and system BIOS. Use BIOS-oriented security methods. Debugging protection. Processor and operating environment architecture. Processor instruction pipeline. Means of counteracting disassembly of programs. Replacement by equivalents. Dynamic code conversion.
Classification of cryptographic algorithms. Basic cryptographic methods.
Symmetric cryptographic systems. General components. Replacement codes. Substitution codes. Permutation codes.
Stream algorithms. Encryption using a pseudo-random number sensor. Mono- and multi-alphabetic ciphers. Bi-grams. Modern streaming crypto algorithms.
Block algorithms. Schemes of using block ciphers. DES - US Standard. on data encryption. Modern block crypto algorithms.
Public key systems. RSA algorithm. PGP system. Use and application of SVC. Digital signature. Hash functions. Al-Gamal's algorithm. DSS algorithm. SHA algorithm. MD2 algorithm. MD4 algorithm. MD5 algorithm.
Cryptanalysis of encryption algorithms. Statistical, linear, differential cryptanalysis. Cryptanalysis of symmetric systems. Analysis of block ciphers. Analysis of encryption systems based on sensors of pseudo-random ciphers. Analysis of streaming ciphers. Temporal analysis of implementations of asymmetric systems (Diffie-Hellman, RSA, DSS).
Steganography. General concepts. Steganography in text files. Steganography in graphic files.
Information protection in networks. Features of existing means of attack. Protection execution levels and dependent functions. Network security protocols. Firewalls and their applications. Configurations for building secure network nodes.