Вы находитесь на странице: 1из 5

«ҰЛТТЫҚ МЕДИЦИНА УНИВЕРСИТЕТІ» АКЦИОНЕРЛІК ҚОҒАМЫ

АКЦИОНЕРНОЕ ОБЩЕСТВО «НАЦИОНАЛЬНЫЙ МЕДИЦИНСКИЙ УНИВЕРСИТЕТ»


Methodical recommendations Edition: 1
Department «Informatics with biophysics
course» Page 1 of 5

Theme №11. Сybersafety. Methods and means of information protection

Purpose: Studying the complex of problems of information security of business


structures of different types and directions of activity, formation, operation and
improvement of the legal, organizational, technical and technological processes that
ensure the information security and form the structure of protection system of valuable
and confidential information in the areas of security of employers’ intellectual property
and the safety of their information resources. Carrying out the minimization of losses
caused by the violation data’s integrity or confidentiality, and also their unavailability
for consumers. Learning the basic concepts of cryptology and encryption.

Learning outcomes: Mastering the theoretical, practical and methodological issues of


information security and to learn the systematic complex methods of protection of
business information from different types of objective and subjective risks in the
process of its formation, processing, using and keeping. Methods of cryptographic
data conversion.

Main issues of the theme:


1. Information security.
2. Types of threats and information security.
3. Antivirus programs.
4. Types of viruses.
5. Methods and ways to protect the information.

Tasks:

Practical skills Score


- 59
1. Encrypt text “Cryptography” with the key 11,2,5,7,9,3,1,4,8,10,6,12 . 5
2. Encrypt text ‘Hardware system tools’ with the help of table 5*6 (5 is 9
column, 6 is row).
3. Decipher the text «OTFNOAOAYIRTNF_MI_FES» by means of 5
following key 8,5,9,12,14,17,20,2,6,11,15,18,21,3,7,16,19,10,13,4,1and
write a clear text.
4. Decipher the text "I_SBACIIFDENN_OTI_" by means of "NUMBER" 10
key write a clear text.
5. The Richelieu (Ришелье) template
Using a rectangle with size of 10 * 11 (number of columns * number of 10
rows), place the template with the following positions:
(5,1), (8,1), (5,2), (8,2), (9,2), (5,3), (1,4), (6,4), (7,4), (8,5), (3,6), (5,7),
(1,8), (5,9), (2,10), (5,10), (9,10), (2,11), (7,11), (4,3), (2,1), (2,2), (1,1),
(4,1) (9,1), (9,11), (6,2), (7,2), (2,5), (8,9), (4,8), (10,2), (9,5), (9,4), (6,9),
«ҰЛТТЫҚ МЕДИЦИНА УНИВЕРСИТЕТІ» АКЦИОНЕРЛІК ҚОҒАМЫ
АКЦИОНЕРНОЕ ОБЩЕСТВО «НАЦИОНАЛЬНЫЙ МЕДИЦИНСКИЙ УНИВЕРСИТЕТ»
Methodical recommendations Edition: 1
Department «Informatics with biophysics
course» Page 2 of 5

(10,7), (1,7), (3,8), (8,10), (2,8), (10,10)


1 2 3 4 5 6 7 8 9 10
1
2
3
4
5
6
7
8
9
10
1 11 O A T V Я O Е
2 С R Е P E N G О L Pic.
1.
3 Q А D F Е D O R К
4 T Т К Р О H E М C Е
5 Z E М Е Т S
6 Н Е H Н А Р О Ч Н О
7 C Т О O Т А Р V E
8 S U K A С G K Н У M
9 Н А Р P H Е R О К
10 С I А N T X F - A P
11 S L В Т M L G
Example of the table.
1 2 3 4 5 6 7 8 9 10

Though using Richelieu’s template figure out the text: «...».


6. Caesar cipher
10
«ҰЛТТЫҚ МЕДИЦИНА УНИВЕРСИТЕТІ» АКЦИОНЕРЛІК ҚОҒАМЫ
АКЦИОНЕРНОЕ ОБЩЕСТВО «НАЦИОНАЛЬНЫЙ МЕДИЦИНСКИЙ УНИВЕРСИТЕТ»
Methodical recommendations Edition: 1
Department «Informatics with biophysics
course» Page 3 of 5

Initial alphabet: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ciphered: D E F G H I J K L M N O P Q R S T U V W X Y Z

Encrypt and decrypt the following phrases using Caesar's cipher:


a) XKQFSFORP PLCQTXOB
b) ZLJJRKFZXQFLK PVPQBJ
c) ERROHDQ ORJLF
d) RANDOM ACCESS MEMORY
e) INTERNET ADDRESS
f) WORLD WIDE WEB
7. “POLYBIUS SQUARE” has the following form: 10
1 2 3 4 5
1 S I H L G
2 T R V A J
3 P F O D B
4 Z N U Q C
5 E X M Y K
Encrypt the words on it: "Syndrome", "Symptom", "Doping", "Diagnosis",
"Analysis", "Amnesia", "Hypnosis", "Virus", "Neurosis", "Stress",
"Reflex", "Therapy", "Enzyme".
8. Polybius square.
In a square measuring 4 by 4 (dimensions can be other) enter numbers from
1 to 16.
Task: The closed text "SAEHNMEG_INTRDOL" is set. The key to this
text is the “Magic Square” table. Your task is to add cells to the table so
that the sum of the numbers in rows, columns and full diagonals is equal to
the same number - 34.
3 2
16
5 11 8
9 6 12
15 14 1
After finding all the numbers of the table (key), place the closed text
horizontally in it, placing one letter in each cell. In accordance with the
sequential order of numbers, you will determine the plaintext !!!
«ҰЛТТЫҚ МЕДИЦИНА УНИВЕРСИТЕТІ» АКЦИОНЕРЛІК ҚОҒАМЫ
АКЦИОНЕРНОЕ ОБЩЕСТВО «НАЦИОНАЛЬНЫЙ МЕДИЦИНСКИЙ УНИВЕРСИТЕТ»
Methodical recommendations Edition: 1
Department «Informatics with biophysics
course» Page 4 of 5

Tasks of SIW

№ Tasks max
score
15
1 Encrypt text “Confidentiality” with the key 13, 11, 2, 5, 14, 7, 9, 3, 15
1, 4, 8, 15, 10, 6, 12.
2 Encrypt the open text ‘Cryptanalysis’ with key ‘Code’. 15
3 Decipher text ‘NRМАFNТIОIO’ with the help of key 11, 5, 6, 7, 15
3, 2, 8, 1, 4, 9, 10 and write an open text.
4 Decipher text ‘YRPO_STETMMSECU’ with the help of 11, 8, 4, 15
2, 9, 10, 13, 7, 6, 15, 3, 12, 14, 1, 5 and write an open text.
5 Decipher text «SMYMEITRCR_CYOPTSTYSE_MS» with the help 15
of key «CODE» and write an open text.
6 Transposition cipher.
Encrypt the next phrase «Methods of disclosure ciphers» by 15
selecting a positive integer - 4.
7 Encrypt the open text «Encrypting algorithm» via ‘Cipher’ key. 15
8 Define the following text by means of the Caesar cypher: 15
«SUDFWLFDO VNLOOV»

Additional task ***

№ Tasks
1. Create a folder under the name of your group in “Documents \ Student Work”. In the current
folder, create files with the format .doc, .exe, .ppt, .jpg, .mp3. Each file must contain
information about you. For example, an autobiography. Encrypt all files using the Kryptel
program. Show the result to the teacher and then decrypt. As a result, encrypt the source folder
you created.

Evaluation sheet (max -11)


full answer -11 not full answer - 6 incorrect answer -0

Tasks of IWST

Tasks
1 Movement cypher. Cypher an open text «Statistical analysis» by means of the
«Book» key.
2 Cypher the open text «Full name» with the key «Group».
«ҰЛТТЫҚ МЕДИЦИНА УНИВЕРСИТЕТІ» АКЦИОНЕРЛІК ҚОҒАМЫ
АКЦИОНЕРНОЕ ОБЩЕСТВО «НАЦИОНАЛЬНЫЙ МЕДИЦИНСКИЙ УНИВЕРСИТЕТ»
Methodical recommendations Edition: 1
Department «Informatics with biophysics
course» Page 5 of 5

3 Cypher the open text «Arterial pressure» with the following key
17,10,1,7,12,9,15,3,14,8,16,5,2,13,4,11,6.
4 Cypher the open text «STATISTICAL ANALYSIS» with the key «31425»

Bibliography:

1. "Informationand communication technologies" коллектив авторов:


Шыныбеков Д.А., Ускенбаева Р.К., Сербин В.В., Дузбаев Н.Т.,
Молдагулова А.Н., Дуйсебекова К.С., Сатыбалдиева Р.Ж., Хасенова Г.И.,
Урмашев Б.,Первое издание Алматы, 2017г., (2 часть) стр. 295-328.
2. https://rb.ru/longread/cybersecurity-today/

Вам также может понравиться