1. Course Title | Design of Security Systems | |||||||
2. Code | 4ФЕИТ01Л015 | |||||||
3. Study program | КСИАР | |||||||
4. Organizer of the study program (unit, institute, department) | Faculty of Electrical Engineering and Information Technologies | |||||||
5. Degree (first, second, third cycle) | First cycle | |||||||
6. Academic year/semester | III/6 | 7. Number of ECTS credits | 6 | |||||
8. Lecturer | D-r Zhivko Kokolanski,D-r Dushko Stavrov | |||||||
9. Course Prerequisites | Passed: Electrical Measurements | |||||||
10. Course Goals (acquired competencies): The students will be introduced to the needs of and methods for the protection and security of automated processes and control systems. The most common security systems and approaches will be taught. Students will be able to design, implement, test, upgrade, and perform maintenance on security systems. | ||||||||
11. Course Syllabus: Security systems and security engineering. Security systems in potentially explosive zones, standardization, and design. Toxic gas detection systems. Fire protection systems. Access control systems and intruder detection systems. Video surveillance systems. Remote monitoring systems. Building automation systems. IT security systems. Internet security approaches. Data encryption and decryption. | ||||||||
12. Learning methods: Combined: presentations, homework, project assignments, practical laboratory work. | ||||||||
13. Total number of course hours | 2 + 2 + 1 + 0 | |||||||
14. Distribution of course hours | 180 | |||||||
15. Forms of teaching | 15.1. Lectures-theoretical teaching | 30 | ||||||
15.2. Exercises (laboratory, practice classes), seminars, teamwork | 45 | |||||||
16. Other course activities | 16.1. Projects, seminar papers | 30 | ||||||
16.2. Individual tasks | 30 | |||||||
16.3. Homework and self-learning | 45 | |||||||
17. Grading | 17.1. Exams | 20 | ||||||
17.2. Seminar work/project (presentation: written and oral) | 20 | |||||||
17.3. Activity and participation | 10 | |||||||
17.4. Final exam | 50 | |||||||
18. Grading criteria (points) | up to 50 points | 5 (five) (F) | ||||||
from 51to 60 points | 6 (six) (E) | |||||||
from 61to 70 points | 7 (seven) (D) | |||||||
from 71to 80 points | 8 (eight) (C) | |||||||
from 81to 90 points | 9 (nine) (B) | |||||||
from 91to 100 points | 10 (ten) (A) | |||||||
19. Conditions for acquiring teacher’s signature and for taking final exam | Regular attendance at classes and completion of the laboratory work assignments | |||||||
20. Forms of assessment | During the semester, two partial written exams are scheduled (at the middle and at the end of the semester, each with a duration of 120 minutes), as well as tests during the regular classes, and a test for the laboratory exercises. The students are given an option to choose if they want to work on a practical project. The final grade is formed based on the points from the partial exams, the tests, and the project (if chosen). In the planned exam sessions a final written exam is taken (duration 120 minutes). The final grade is formed based on the points from the partial exams, the tests and the project (if chosen). If the students choose to work on a practical project, then they need to work out a practical solution, supported by technical documentation. The students work on their projects during the laboratory exercises. The project must be finished and presented two weeks before the end of the semester. |
|||||||
21. Language | Macedonian and English | |||||||
22. Method of monitoring of teaching quality | Internal evaluation and polls | |||||||
23. Literature | ||||||||
23.1. Required Literature | ||||||||
No. | Author | Title | Publisher | Year | ||||
1 | Живко Коколански | Проектирање на сигурносни системи, интерна скрипта | ФЕИТ | 2021 | ||||
2 | Lorie Faith Cranor | Security and Usability | O’Reilly | 2005 | ||||
3 | Robert L. Pearson | Electronic Security Systems | Elsevier | 2007 | ||||
23.2. Additional Literature | ||||||||
No. | Author | Title | Publisher | Year | ||||
1 | A.W. Peabody | Control of Pipeline Corrosion | Addison Wesley | 2018 | ||||
2 | Mohammad S. Obaidat | Security of e-Systems and Computer Networks | Cambridge | 2007 | ||||
3 | Matt Bishop | Computer Security: Art and Science | Addison Wesley | 2002 |