course aims in Estonian
Õppeaine eesmärgiks on anda õppuritele baastasemel süstemaatilised teadmised kaasaegsest andmeturbest ja krüptoloogiast niisuguses mahus, mis on vajalikud ühele IT praktikule valdkonna piisavaks tundmiseks kõikides oma erialal ettetulevates tüüpseisudes ning materjali iseseis-vaks omandamiseks kaasnevates valdkondades
course aims in English
The aim of the course is to give students a systematic ground-level knowledge of
contemporary data security and cryptology in amount, which is necessary to typical IT practitioner and which is sufficient for his/her typical professional activities and sufficient for a successful self-aquisition of advanced materials
learning outcomes in the course in Est.
• Tudeng orienteerub andmeturbe ja krüptograafia baasmõistetes ja nende
omavahelistes seostes
• Tudeng oskab kasutada andmete turvamiseks vajalikke tehnikaid ja
võtteid erinevates praktilistes situatsioonides
• Tudeng valdab kaasaegse krüptograafia algoritme ja protokolle mahus,
mis võimaldab nende kasutamist digiandmete turbe praktiliste
tööriistadena
• Tudeng teab Eesti rahvusliku infoturbetaristu koostisosade (eID-lahendused,
PKI, ISKE, X-tee jt) toimimispõhimõtteid ja oskab neid
praktikas erinevates situatsioonides kasutada
• Tudeng oskab praktiliste IT probleemide korral näha nende seotust
turbega ja orienteeruda turbeülesande lahendusviisides
• Tudeng on kursis olulisemate turbevaldkondade (eID-lahendused, isikuandmete kaitse, digiallkiri, riskianalüüs) õigusliku reguleerimisega nii Eestis, Euroopa Liidus kui ka mujal maailmas
learning outcomes in the course in Eng.
• The student is familiar with data security and cryptography basic
concepts and their' relationships
• The student can use different techniques and methods for achieving
the data security in various practical situations
• The student can use the modern cryptography algorithms and
protocols in the level, which is necessary for their' use for actual data
securing
• The student is familiar with all components of Estonian national
information security infrastructure (eID-solutions, PKI, ISKE, X-road,
etc.) and can use all of them in different practical situations
• The student is able to see for all practical IT problems their
relationship with data security with the typical solving ways of it
• The student is familiar with the legal regulation of common security-related topics (eID-solutions, prsonal data protection, digital signature, risk analysis) in Estonia, in EU and it the world
brief description of the course in Estonian
Õppeaine tutvustab tudengile andmeturbe üldmõisteid – turvaohte, -nõrkusi ja
turvameetmeid –, samuti nende omavahelisi seoseid. Neid vaadeldakse riskihalduse võtmes, käsitledes põhjalikumalt Eestis kehtivat etalonturbemetoodikat ISKE kui ka maailmas kasutatavaid tuntumaid standardeid. Krüptograafiat kuiteoreetilist distsipliini katab aine praktilise poole pealt, kes-kendudes peamiselt erinevate algoritmide ja algoritmitüüpide (sümmeetrilised, asümmeetrilised räsial-goritmid) kasutatavusele digiandmete praktilise turbe tagamisel. Vaadeldakse tüüpvõtteid, kuidas taga-takse erinevat tüüpi andmete turvaeesmärgid –käideldavus, terviklus ja konfidentsiaalsus. Käsitletakse andmebaaside ja võrguturbeturbetehnikaid, samuti turvalist autentimist. Vaadeldakse turvaprogram-meerimise tüüpvõtteid. Pikemalt käsitletakse Eesti kasutatavaid PKI jaturbetaristu lahendusi – digiall-kiri, ID-kaart, mobiil-ID, X-tee. Keskendutakse ka organisatsiooni turbehaldusele ning turbe õiguslikule reguleerimisele. Samuti kajastatakse steganograafia kui teabe peitmise teaduse aspekte.
brief description of the course in English
Course introduces data security main concepts - security threats, vulnerabilities and safeguards - with their’ interrelationship. These topics are considered from the risk management point of view, introducing also Estonian national IT security (baseline approach) IT securety standard ISKE as well as the common international standards in this field. Cryptography as a deep theoretical discipline is considered mainlyfrom the practical side, focusing on the various algorithms (symmetric, aymmetruc and hash algorithms) and their’ practical usability for securing of digital data. A typical methods and techniques for achieving the different security goals – availability, integrity and confidentiality – for different types of data are also considered. Course also introduces the main security techniques of database security and network security, as well as secure authentication. Also the secure coding main principles are introduced. A significiant attention in the course is devoted to different (mainly Estonian national) PKI solutions as digital signature, ID-card, mobile-ID, X-road. The security management and security legal regulation topics are also co-vered. The course also covers the main steganographic (information hiding) topics.
type of assessment in Estonian
-
type of assessment in English
-
independent study in Estonian
teemakohane referaat või uurimistöö
independent study in English
referative work in the field of data security and cryptology
study literature
• Infosüsteemide turve 1: turvarisk. Vello Hanson, Märt Laur, Monika Oit, Kristjan Alliksoo ,
• Cybernetica AS, Tallinn 2009
Infosüsteemide turve 2: turbetehnoloogia. Vello Hanson, Ahto Buldas, Tarvi Martens,
• Helger Lipmaa, Arne Ansper, Viljar Tulit. Küberneetika AS, Tallinn 1998
• Ross Anderson. Security engineering. http://www.cl.cam.ac.uk/~rja14/book.html
• H. Mägi, L. Vitsut. Infosõda: visioonid ja tegelikkus. Tallinn, EE, 2008
• T. Beltier, J. Beltier, J. Blackley. Information Security Fundamentals. Auerbach, 2004
• A. Manezes, P. Oorschot, S. Vanstone. Handbook Of Applied Cryptography. CRC Press,
• 2001
• J. Katz, Y. Lindell. Introduction to modern cryptography. CRC Press, 2007
study forms and load
daytime study: weekly hours
3.5
session-based study work load (in a semester):
practices
1.5
practices
10.0