Information Security Systems

Ph.D Degree in Information Security Systems
Сipher: 6D100200
Name: Information Security Systems

Purpose To provide students with theoretical knowledge and practical skills allowing to identify actual problems, set tasks to address them, plane a research for decision modern scientific problems of design and implementation Information Security Systems in various areas of human activity and to have skills of scientific and pedagogical work on training of specialists on Information Security Systems.

Basic Professional Modules: Required Core Modules:

State Compulsory Module

Models and methods   of   information security assessment 

Theory of informationsecurity

Elective modules of professional specialization 
  • Module 1: Information defense, information safety
    • Methods and systems of information defense, information safety
  • Module 2: Management of risk
    • Management of risk in distributed information-telecommunication systems
  • Module 3: Safety of the distributed state administration IS
    • Safety of the distributed state administration information systems
  • Module 4: Cryptoanalysis
    • Cryptoanalysis 1
  • Module 5: information analytic safety systems
    • Information analytic safety systems
Elective modules of individual educational paths
  • Module 1: Algorithms and complex systems
    • Analysis of algorithms          
    • Technology of planning complex systems
  • Module 2: Cryptoanalysis and cryptography
    • Cryptoanalysis 2       
    • Theory, methods and tools of cryptography
  • Module 3: Internet safety   protocols and information safety of objects
    • Formal methods for internet safety   protocols
    • Technologies of providing information safety of objects

Information   security and databases

Elective modules of professional specialization
  • Module 1: Information safety and databases
    • Information safety and databases
  • Module 2: Neuro-fuzzy systems
    • Neuro-fuzzy systems and technology
  • Module 3: Information systems and electronic document defence
    • Methods and tools of defence information systems and electronic document
  • Module 4: Providing information safety
    • Providing Information safety
  • Module 5: Management by information safety
    • Management by information safety
Elective modules of individual educational paths
  • Module 1: Client-server systems and information safety
    • Safety of the client-server systems
    • Program hardware tools- of information safety
  • Module 2: Strategy and information defence
    • Strategy of electronic business, architecture and planning
    • Development of tools of information defence
  • Module 3: Programming and Testing safety systems
    • Programming safety systems
    • Testing safety systems

Professional Practice Internship

  • Research
  • Teaching
  • Research Seminar I
  • Research Seminar II
  • Research Seminar III
  • Research Seminar IV
  • Research Seminar V
  • Research Seminar VI

Doctoral Student's Reseach Work

Doctoral Student's Reseach Work and Fullfilment of Dissertation

Final Attestation

Complex Examination
Dissertation Fullfilment and Defence
Employability Graduates of the PhD can work in research institutes, in state or private educational institution as a lecturer, in area of communication and banks, public and private companies and organizations to develop, implement and use organizational, hardware and software methods and tools of information systems protection in different areas of human activity and critical operating information.
Further studies Graduates of the PhD can continue their education at the postdoctorate level in the profession or professions related to this one. They can also continue to research activities in different areas of economics security, in which will directly apply their knowledge. Access to teacher training (educa­tion track); to Research and Pedagogic training.
Program learning outcomes A graduate of the Information Security Systems PhD program must possess the following knowledge, skills, and competences:
Have an understanding of:
  • problems of constructing protected IS;
  • methods of cryptographic protection;
  • the concept of information security;
  • types of threats to information security;
  • methods and means of dealing with threats to information security;
  • the concept of security policy, the existing types of security policies;
  • models and methods of information security;
  • current problems of Information Security Systems;
  • analytical, qualitative and numerical research methods necessary for independent research work; methods of creation and use of mathematical models to describe and forecast various physical-chemical and natural processes and phenomena;
  • existing information security standards;
  • egulatory guidelines relating to state secrets;
  • history and philosophy of science; research methods used in modern science and links between theory and practice; basics of bibliographic research; foundations of higher-education psychology and pedagogy, and methods of teaching mathematical modules; the methodology of labor and personnel management;
Be able to:
  • perform analysis techniques of violations of information security;
  • use the methods of data and systems protection.
  • apply the theoretical knowledge received in the fundamental fields of Information Security Systems to solve theoretical, scientific practical and information search-related tasks;
  • solve complex interdisciplinary problems; carry out qualitative and quantitative analysis of obtained results;
  • construct standard mathematical and computer models of physical, technical, economic and other processes;
  • teaching general Information Security Systems modules;
  • computer-based search, collection, preparation and processing of information used in his/her professional activity;
Have skills:
  • of properly formulating goals and objectives of scientific research as well as the concept of scientific search;
  • performing a patent search and applying for an invention; presenting results of studies (in the form of articles, reports, papers etc.);
  • organizing work on a scientific basis;
  • acquiring new knowledge using modern information technologies;
  • be competent in a foreign language to be able to conduct professional discussions, read and translate specialized literature.