Fundamentals of Cyber Security and Protecting Systems Against Cyber Attacks
Study Course Implementer
Dzirciema street 16, Rīga, szf@rsu.lv
About Study Course
Objective
Preliminary Knowledge
Learning Outcomes
Knowledge
1.1. Knows the basics of cyber security, internet security and digital device and network cyber hygiene. 2. Knows network etiquette (non-etiquette), the culture of using digital media. 3. Familiar with legal aspects of personal data processing, Latvian and European regulations in the field of personal data processing. 4. Knows different types of attacks, includes the basics of social engineering. 5. Knows the good practice principles of information system, operating system security management. 6. Knows the basics of cryptography and information encryption technologies used on the Internet. 7. Knows the basics of computer network security: establishing a security connection, secure user authentication (including two-factor authentication). 8. Knows the basic principles of the peculiarities, installation and maintenance of video surveillance and room access control systems.
Skills
1.1. Can apply knowledge about aspects of cyber security and personal data protection in everyday life. 2. Can identify ways to protect personal data from third parties, including using digital security technologies. 3. Can perform security audit of information systems and analysis of system security risks. 4. Knows how to identify CSRF, XSS, DoS, DDos attacks, SQL injections, and also knows how to protect ICT systems from them. 5. Can conduct employee training in organizations on the basics of cyber security and the need for daily cyber hygiene. 6. Knows how to encrypt data and systems to ensure confidentiality of information.
Competences
1.Participates in discussions about information security of individuals and companies, cyber security, knows how to recognize digital transformations at work.
Assessment
Individual work
|
Title
|
% from total grade
|
Grade
|
|---|---|---|
|
1.
Individual work |
-
|
-
|
|
Students independently prepare for classes by reading and analyzing the materials offered by the lecturer, analyzing the necessary information, as well as analyzing the possibilities of devices, software and systems (see the list of mandatory literature and additional sources of information to be used), read the additional literature offered by the lecturer, and complete the tasks prepared by the lecturer.
In order to evaluate the quality of the study course as a whole, the student must fill out the study course evaluation questionnaire on the Student Portal.
|
||
Examination
|
Title
|
% from total grade
|
Grade
|
|---|---|---|
|
1.
Examination |
-
|
-
|
|
Class attendance at least 60% of the total number of classes (100%)
Final examination – Differentiated examination, which is implemented in the form of a test.
The test contains 30-40 multiple-choice questions.
|
||
Study Course Theme Plan
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Basic principles of ICT security, cyber security. Internal data protection regulations.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Basic principles of ICT security, cyber security. Internal data protection regulations.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
General Data Protection Regulation.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
General Data Protection Regulation.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Functions and responsibilities of the personal data protection specialist.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Functions and responsibilities of the personal data protection specialist.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Liability for violations in the field of personal data protection, information disclosure law.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Liability for violations in the field of personal data protection, information disclosure law.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Hardware and physical security – attacks and defenses. Video surveillance and room access control systems.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Hardware and physical security – attacks and defenses. Video surveillance and room access control systems.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Basic principles of information security, risk analysis, security management, technical means, security incidents.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Basic principles of information security, risk analysis, security management, technical means, security incidents.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Security management of information systems in organizations, employees responsible for IS security and employee training strategy in organizations. Basics of IS security auditing.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Security management of information systems in organizations, employees responsible for IS security and employee training strategy in organizations. Basics of IS security auditing.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Construction of networks and critical infrastructure and its components. Interdependence of critical infrastructure networks, security risks and protection methods.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Construction of networks and critical infrastructure and its components. Interdependence of critical infrastructure networks, security risks and protection methods.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
The principle of least privilege, access control and operating system security. Internet Protocol Security, TCP, DNS and Routing.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
The principle of least privilege, access control and operating system security. Internet Protocol Security, TCP, DNS and Routing.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Unnecessary Data Flows: Types of Denial of Service Attacks. DoS and DDoS attacks.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Unnecessary Data Flows: Types of Denial of Service Attacks. DoS and DDoS attacks.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Cryptography. Encryption protocol SSL/TLS. HTTPS. Web security model, session management and user authentication
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Cryptography. Encryption protocol SSL/TLS. HTTPS. Web security model, session management and user authentication
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Security of cloud services and network data storage from both technical and legal aspects
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Security of cloud services and network data storage from both technical and legal aspects
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Not a label. Information as an object of legal protection.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Not a label. Information as an object of legal protection.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Criminal liability and administrative violations in the field of information security.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Criminal liability and administrative violations in the field of information security.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Safety measures planning, risk analysis. Unauthorized access to information, social engineering, confidentiality.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Safety measures planning, risk analysis. Unauthorized access to information, social engineering, confidentiality.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Types of threats to the property of individuals and companies in the network. Cyber security both at work and at home.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Types of threats to the property of individuals and companies in the network. Cyber security both at work and at home.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Basic principles of ICT security, cyber security. Internal data protection regulations.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Basic principles of ICT security, cyber security. Internal data protection regulations.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
General Data Protection Regulation.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
General Data Protection Regulation.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Functions and responsibilities of the personal data protection specialist.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Functions and responsibilities of the personal data protection specialist.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Liability for violations in the field of personal data protection, information disclosure law.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Liability for violations in the field of personal data protection, information disclosure law.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Hardware and physical security – attacks and defenses. Video surveillance and room access control systems.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Hardware and physical security – attacks and defenses. Video surveillance and room access control systems.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Basic principles of information security, risk analysis, security management, technical means, security incidents.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Basic principles of information security, risk analysis, security management, technical means, security incidents.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Security management of information systems in organizations, employees responsible for IS security and employee training strategy in organizations. Basics of IS security auditing.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Security management of information systems in organizations, employees responsible for IS security and employee training strategy in organizations. Basics of IS security auditing.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Construction of networks and critical infrastructure and its components. Interdependence of critical infrastructure networks, security risks and protection methods.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Construction of networks and critical infrastructure and its components. Interdependence of critical infrastructure networks, security risks and protection methods.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
The principle of least privilege, access control and operating system security. Internet Protocol Security, TCP, DNS and Routing.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
The principle of least privilege, access control and operating system security. Internet Protocol Security, TCP, DNS and Routing.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Unnecessary Data Flows: Types of Denial of Service Attacks. DoS and DDoS attacks.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Unnecessary Data Flows: Types of Denial of Service Attacks. DoS and DDoS attacks.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Cryptography. Encryption protocol SSL/TLS. HTTPS. Web security model, session management and user authentication
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Cryptography. Encryption protocol SSL/TLS. HTTPS. Web security model, session management and user authentication
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Security of cloud services and network data storage from both technical and legal aspects
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Security of cloud services and network data storage from both technical and legal aspects
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Not a label. Information as an object of legal protection.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Not a label. Information as an object of legal protection.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Criminal liability and administrative violations in the field of information security.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Criminal liability and administrative violations in the field of information security.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Safety measures planning, risk analysis. Unauthorized access to information, social engineering, confidentiality.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Safety measures planning, risk analysis. Unauthorized access to information, social engineering, confidentiality.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Types of threats to the property of individuals and companies in the network. Cyber security both at work and at home.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Types of threats to the property of individuals and companies in the network. Cyber security both at work and at home.
|
Bibliography
Required Reading
Ross J. Anderson. “Security Engineering: A Guide to Building Dependable Distributed Systems”. 2008.
Paul Cichonski, Tom Millar, TimGrance, Karen Scarfone. “Computer Security Incident Handling Guide”.
Vispārīgā datu aizsardzības regula/General Data Protection Regulation
Additional Reading
Informācijas sistēmu drošības pārbaudes vadlīnijas (VARAM). (latviešu plūsmai)
Other Information Sources
Esidross.lv - vietne, kurā apkopota noderīga informācija tiem, kam rūp sava un sava datora, telefona vai citu viedierīču drošība internetā. – Sadaļa “Aktivitātes” (latviešu plūsmai)