Close
  • Call
    Center

  • Class
    schedule

  • Video
    surveillance

  • Virtual
    reception

  • Reserve
    candidate

  • Green
    University


USAGE MANAGEMENT

USAGE MANAGEMENT

Course Information

CourseUSAGE MANAGEMENT CodeACON16MBK
Directions60610300 – Information Security ( Information communication technologies and service ) Semester5
Form of StudyFull-time Taught LanguageEnglish
Lectures42 Practical Lessons30
Laboratory0 Independent Work108
Total Hours180 Credits6

Lectures – Semester V

CodeTopicMaterial
M1The basis of security and user controlDownload
M2Organizational information security policyDownload
M3Password-based authentication methodDownload
M4To tokens based authentication methodsDownload
M5Biometric authentication methodsDownload
M6Identifiers management modelsDownload
M7Elements of trust paradigmsDownload
M8Mandatory users management modelDownload
M9Discretion users management modelDownload
M10Role users management modelDownload
M11Attributed User Management ModelDownload
M12Managing users in the Windows operating systemDownload
M13Linux operating system in the system users managementDownload
M14User management in mobile phone operating systemsDownload
M15Identification devices in physical protectionDownload
M16Biometric means of personal identificationDownload
M17User management control system controllersDownload
M18User management tools for physical protectionDownload
M19Analysis and implementation of control systems for user managementDownload
M20Choosing control systems for user managementDownload

Practical Lessons – Semester V

CodeTopicMaterial
A1Develop an access control clause in the information security policy for the organizationDownload
A2Windows OS accounts and checking password strengthDownload
A3Implementation of identification/authentication through an RFID systemDownload
A4Implementation of a fingerprint identification/authentication systemDownload
A5Implementation of an identification/authentication system through facial recognitionDownload
A6Implementation of a voice identification/authentication systemDownload
A7Familiarization and analysis of the working process of SSO protocolsDownload
A8Configuring access rights for users and groups in the Windows operating systemDownload