8D06301 Information Security Systems

PROGRAM PASSPORT

Speciality Name
Information Security Systems
Speciality Code
8D06301
Faculty
Information technology

QUALIFICATION

  • Scientific and pedagogical direction - Doctor of Philosophy (PhD)

 

MODEL OF GRADUATING STUDENT

Upon completion of this program, PhD graduates are expected to be able to:
1. demonstrate a systematic understanding of information security techniques and tools;
2. justify the choice of decision-making methodology to ensure the protection of information;
3. demonstrate knowledge of patent search procedures, protection of intellectual property rights to scientific discoveries and developments;
4. analyze and evaluate, improve processes, develop specifications and design information security systems;
5. classify methods for ensuring and assessing security in information processing systems (operating systems and applications, networks, protocols);
6. to analyze the existing methods and means used for the control and protection of information, and to develop a proposal for their improvement and increase the effectiveness of this protection;
7. identify similarities and differences in methods and systems of protection, security assessment and measures taken to protect information, methodology for creating secure information systems;
8. develop software for innovative projects using the latest technological solutions;
9. evaluate the cryptographic strength of block ciphers, the synthesis of ciphers, encryption systems with public keys, key distribution protocols, identification, organization of confidential communication networks;
10. analyze, evaluate and synthesize new and complex ideas in the field of information security; formulate innovative scientific tasks in the field of design and development of information security systems;
11. to prepare on the basis of the results of the research publications that deserve coverage at the national and international levels, scientific and technical reports, reviews;
12. to substantiate the obtained scientific results in the field of information security in front of the wider scientific community, convincing opponents and observing the scientific ethics of the researcher.