Ensuring the security of information on the objects of computer equipment and automated control systems

Military training of students in the specialty "Ensuring the protection of information at the facilities of computer equipment and automated control systems" taking into account programs in higher education specialties and has access to a qualitatively new stock specialist for the mobilization deployment of the Armed Forces, other troops and military units of the Republic of Kazakhstan committed to their people, their homeland and the government of the Republic of Kazakhstan, means for protecting information and protecting information. These qualities of students are formed on the basis of knowledge and practical skills acquired by them in the learning process in the departments of the institution in civilian specialties, in the military department and at training camps (internships) in military units.

Students trained in this specialty should:

know:

the basics of modern combined-arms combat, organization, armament, tactics of actions of motorized rifle subunits and methods of controlling subunits in battle; general military regulations of the Armed Forces of the Republic of Kazakhstan; the material part, the rules of storage, care and savings, the rules of firing of small arms; principles of building information security systems; sources and composition of protected information; forms, methods and tools for building information security systems; the composition of the protected information; sources, methods and results of destabilizing effects on information; basic standards in the field of information security.

be able to:

identify possible channels for covert transmission of information; configure any system or network of the required configuration; determine information security strategies; to formulate requirements for an integrated information security system; develop documentation in accordance with applicable republican and international standards; determine the composition of the protected information; develop methods and means of implementation, selected information protection strategies; determine the channels of access to information; identification of information leakage channels; develop models of a potential offender; manage the system in an emergency; to certify and license information security and safety equipment.