Veidlapa Nr. M-3 (8)
Study Course Description

Fundamentals of Cyber Security and Protecting Systems Against Cyber Attacks

Main Study Course Information

Course Code
SZF_145
Branch of Science
Law
ECTS
6.00
Target Audience
Civil and Military Defense; Juridical Science
LQF
Level 7
Study Type And Form
Full-Time; Part-Time

Study Course Implementer

Course Supervisor
Structure Unit Manager
Structural Unit
Faculty of Social Sciences
Contacts

Dzirciema street 16, Rīga, szf@rsu.lv

About Study Course

Objective

To introduce students to the latest trends in digital technologies, cyber security, creating students' understanding of the information security of individuals and companies and its legal protection, as well as to prepare specialists with in-depth knowledge in the protection of information systems and computer networks against cyber attacks.

Preliminary Knowledge

Successfully mastered the study courses realized in the previous semesters.

Learning Outcomes

Knowledge

1.1. Knows the basics of cyber security, internet security and digital device and network cyber hygiene. 2. Knows network etiquette (non-etiquette), the culture of using digital media. 3. Familiar with legal aspects of personal data processing, Latvian and European regulations in the field of personal data processing. 4. Knows different types of attacks, includes the basics of social engineering. 5. Knows the good practice principles of information system, operating system security management. 6. Knows the basics of cryptography and information encryption technologies used on the Internet. 7. Knows the basics of computer network security: establishing a security connection, secure user authentication (including two-factor authentication). 8. Knows the basic principles of the peculiarities, installation and maintenance of video surveillance and room access control systems.

Skills

1.1. Can apply knowledge about aspects of cyber security and personal data protection in everyday life. 2. Can identify ways to protect personal data from third parties, including using digital security technologies. 3. Can perform security audit of information systems and analysis of system security risks. 4. Knows how to identify CSRF, XSS, DoS, DDos attacks, SQL injections, and also knows how to protect ICT systems from them. 5. Can conduct employee training in organizations on the basics of cyber security and the need for daily cyber hygiene. 6. Knows how to encrypt data and systems to ensure confidentiality of information.

Competences

1.Participates in discussions about information security of individuals and companies, cyber security, knows how to recognize digital transformations at work.

Assessment

Individual work

Title
% from total grade
Grade
1.

Individual work

-
-
Students independently prepare for classes by reading and analyzing the materials offered by the lecturer, analyzing the necessary information, as well as analyzing the possibilities of devices, software and systems (see the list of mandatory literature and additional sources of information to be used), read the additional literature offered by the lecturer, and complete the tasks prepared by the lecturer. In order to evaluate the quality of the study course as a whole, the student must fill out the study course evaluation questionnaire on the Student Portal.

Examination

Title
% from total grade
Grade
1.

Examination

-
-
Class attendance at least 60% of the total number of classes (100%) Final examination – Differentiated examination, which is implemented in the form of a test. The test contains 30-40 multiple-choice questions.

Study Course Theme Plan

FULL-TIME
Part 1
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Basic principles of ICT security, cyber security. Internal data protection regulations.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Basic principles of ICT security, cyber security. Internal data protection regulations.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

General Data Protection Regulation.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

General Data Protection Regulation.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Functions and responsibilities of the personal data protection specialist.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Functions and responsibilities of the personal data protection specialist.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Liability for violations in the field of personal data protection, information disclosure law.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Liability for violations in the field of personal data protection, information disclosure law.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Hardware and physical security – attacks and defenses. Video surveillance and room access control systems.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Hardware and physical security – attacks and defenses. Video surveillance and room access control systems.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Basic principles of information security, risk analysis, security management, technical means, security incidents.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Basic principles of information security, risk analysis, security management, technical means, security incidents.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Security management of information systems in organizations, employees responsible for IS security and employee training strategy in organizations. Basics of IS security auditing.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Security management of information systems in organizations, employees responsible for IS security and employee training strategy in organizations. Basics of IS security auditing.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Construction of networks and critical infrastructure and its components. Interdependence of critical infrastructure networks, security risks and protection methods.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Construction of networks and critical infrastructure and its components. Interdependence of critical infrastructure networks, security risks and protection methods.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

The principle of least privilege, access control and operating system security. Internet Protocol Security, TCP, DNS and Routing.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

The principle of least privilege, access control and operating system security. Internet Protocol Security, TCP, DNS and Routing.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Unnecessary Data Flows: Types of Denial of Service Attacks. DoS and DDoS attacks.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Unnecessary Data Flows: Types of Denial of Service Attacks. DoS and DDoS attacks.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Cryptography. Encryption protocol SSL/TLS. HTTPS. Web security model, session management and user authentication
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Cryptography. Encryption protocol SSL/TLS. HTTPS. Web security model, session management and user authentication
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Security of cloud services and network data storage from both technical and legal aspects
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Security of cloud services and network data storage from both technical and legal aspects
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Not a label. Information as an object of legal protection.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Not a label. Information as an object of legal protection.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Criminal liability and administrative violations in the field of information security.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Criminal liability and administrative violations in the field of information security.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Safety measures planning, risk analysis. Unauthorized access to information, social engineering, confidentiality.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Safety measures planning, risk analysis. Unauthorized access to information, social engineering, confidentiality.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Types of threats to the property of individuals and companies in the network. Cyber security both at work and at home.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Types of threats to the property of individuals and companies in the network. Cyber security both at work and at home.
Total ECTS (Creditpoints):
6.00
Contact hours:
80 Academic Hours
Final Examination:
Exam (Written)
PART-TIME
Part 1
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Basic principles of ICT security, cyber security. Internal data protection regulations.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Basic principles of ICT security, cyber security. Internal data protection regulations.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

General Data Protection Regulation.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

General Data Protection Regulation.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Concept of personal data protection, principles and purposes of personal data processing. Rights, obligations, limitations and responsibility of users of personal data.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Functions and responsibilities of the personal data protection specialist.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Functions and responsibilities of the personal data protection specialist.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Liability for violations in the field of personal data protection, information disclosure law.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Liability for violations in the field of personal data protection, information disclosure law.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Overview of attack types. Social engineering, indirect and brute force attacks. CSRF, XSS attacks, SQL injections.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Hardware and physical security – attacks and defenses. Video surveillance and room access control systems.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Hardware and physical security – attacks and defenses. Video surveillance and room access control systems.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Basic principles of information security, risk analysis, security management, technical means, security incidents.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Basic principles of information security, risk analysis, security management, technical means, security incidents.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Security management of information systems in organizations, employees responsible for IS security and employee training strategy in organizations. Basics of IS security auditing.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Security management of information systems in organizations, employees responsible for IS security and employee training strategy in organizations. Basics of IS security auditing.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Construction of networks and critical infrastructure and its components. Interdependence of critical infrastructure networks, security risks and protection methods.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Construction of networks and critical infrastructure and its components. Interdependence of critical infrastructure networks, security risks and protection methods.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

The principle of least privilege, access control and operating system security. Internet Protocol Security, TCP, DNS and Routing.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

The principle of least privilege, access control and operating system security. Internet Protocol Security, TCP, DNS and Routing.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Unnecessary Data Flows: Types of Denial of Service Attacks. DoS and DDoS attacks.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Unnecessary Data Flows: Types of Denial of Service Attacks. DoS and DDoS attacks.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Cryptography. Encryption protocol SSL/TLS. HTTPS. Web security model, session management and user authentication
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Cryptography. Encryption protocol SSL/TLS. HTTPS. Web security model, session management and user authentication
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Security of cloud services and network data storage from both technical and legal aspects
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Security of cloud services and network data storage from both technical and legal aspects
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Not a label. Information as an object of legal protection.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Not a label. Information as an object of legal protection.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Criminal liability and administrative violations in the field of information security.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Criminal liability and administrative violations in the field of information security.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Safety measures planning, risk analysis. Unauthorized access to information, social engineering, confidentiality.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Safety measures planning, risk analysis. Unauthorized access to information, social engineering, confidentiality.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Types of threats to the property of individuals and companies in the network. Cyber security both at work and at home.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Types of threats to the property of individuals and companies in the network. Cyber security both at work and at home.
Total ECTS (Creditpoints):
6.00
Contact hours:
80 Academic Hours
Final Examination:
Exam (Written)

Bibliography

Required Reading

1.

Ross J. Anderson. “Security Engineering: A Guide to Building Dependable Distributed Systems”. 2008.

2.

Paul Cichonski, Tom Millar, TimGrance, Karen Scarfone. “Computer Security Incident Handling Guide”.

3.

Uldis Miķelsons. Informācijas sistēmu drošība. (latviešu plūsmai)

4.

Elektronisko dokumentu likums/Electronic Documents Law

5.

Fizisko personu datu apstrādes likums/Personal Data Processing Law

6.

Vispārīgā datu aizsardzības regula/General Data Protection Regulation

Additional Reading

1.

”E-pakalpojumi Latvijā Preces un pakalpojumi internetā”. 2015. (latviešu plūsmai)

2.

“Vēstuļu rakstīšanas VADLĪNIJAS”. Valsts kanceleja, 2017. (latviešu plūsmai)

3.

Informācijas sistēmu drošības pārbaudes vadlīnijas (VARAM). (latviešu plūsmai)

4.

Personas datu apstrādes sistēmu audita rokasgrāmata. (latviešu plūsmai)

Other Information Sources

1.

Latvijas Drošāka interneta centrs – Sadaļa “Jaunumi” (latviešu plūsmai)

2.

Esidross.lv - vietne, kurā apkopota noderīga informācija tiem, kam rūp sava un sava datora, telefona vai citu viedierīču drošība internetā. – Sadaļa “Aktivitātes” (latviešu plūsmai)

3.

Latvijas Drošāka interneta centrs – Sadaļa “Materiāli” (materiālu bibliotēkā) (latviešu plūsmai)

4.

CERT.LV (Informācijas tehnoloģiju drošības incidentu novēršanas institūcija) struktūrvienība, kas darbojas Latvijas Republikas Aizsardzības ministrijas pakļautībā IT drošības likuma ietvaros. – Sadaļa “Ziņas” (latviešu plūsmai)