1. Course Title | Design of Security Systems | |||||||
2. Code | 3ФЕИТ01Л016 | |||||||
3. Study program | KSIAR | |||||||
4. Organizer of the study program (unit, institute, department) | Faculty of Electrical Engineering and Information Technologies | |||||||
5. Degree (first, second, third cycle) | First cycle | |||||||
6. Academic year/semester | III/6 | 7. Number of ECTS credits | 6.00 | |||||
8. Lecturer | Dr Zhivko Kokolanski | |||||||
9. Course Prerequisites | ||||||||
10. Course Goals (acquired competencies): The students will be introduced to the needs of and methods for protection and security of automated processes and control systems. The most common security systems and approaches will be taught. Students will be able to design, implement, test, upgrade, and perform maintenance on security systems. |
||||||||
11. Course Syllabus: Security systems and security engineering. Security systems in potentially explosive zones, standardization and design. Toxic gas detection systems. Fire protection systems. Access control systems and intruder detection systems. Video surveillance systems. Remote monitoring systems. Building automation systems. IT security systems. Internet security approaches. Data encryption and decryption. |
||||||||
12. Learning methods: Combined: presentations, homework, project assignments, practical laboratory work. |
||||||||
13. Total number of course hours | 2 + 2 + 1 + 0 | |||||||
14. Distribution of course hours | 180 | |||||||
15. Forms of teaching | 15.1. Lectures-theoretical teaching | 30 | ||||||
15.2. Exercises (laboratory, practice classes), seminars, teamwork | 45 | |||||||
16. Other course activities | 16.1. Projects, seminar papers | 30 | ||||||
16.2. Individual tasks | 30 | |||||||
16.3. Homework and self-learning | 45 | |||||||
17. Grading | 17.1. Exams | 20 | ||||||
17.2. Seminar work/project (presentation: written and oral) | 20 | |||||||
17.3. Activity and participation | 10 | |||||||
17.4. Final exam | 50 | |||||||
18. Grading criteria (points) | up to 50 points | 5 (five) (F) | ||||||
from 51 to 60 points | 6 (six) (E) | |||||||
from 61 to 70 points | 7 (seven) (D) | |||||||
from 71 to 80 points | 8 (eight) (C) | |||||||
from 81 to 90 points | 9 (nine) (B) | |||||||
from 91 to 100 points | 10 (ten) (A) | |||||||
19. Conditions for acquiring teacher’s signature and for taking final exam | Regular attendance at classes and completion of the laboratory work assignments. | |||||||
20. Forms of assessment | During the semester, two partial written exams are scheduled (at the middle and at the end of the semester, each with a duration of 120 minutes), as well as tests during the regular classes, and a test for the laboratory exercises. The students are given an option to choose if they want to work on a practical project. The final grade is formed based on the points from the partial exams, the tests, and the project (if chosen). In the planned exam sessions a final written exam is taken (duration 120 minutes). The final grade is formed based on the points from the partial exams, the tests and the project (if chosen). If the students choose to work on a practical project, then they need to work out a practical solution, supported by technical documentation. The students work on their projects during the laboratory exercises. The project must be finished and presented two weeks before the end of the semester |
|||||||
21. Language | Macedonian and English | |||||||
22. Method of monitoring of teaching quality | Internal evaluation and polls. | |||||||
23. Literature | ||||||||
23.1. Required Literature | ||||||||
No. | Author | Title | Publisher | Year | ||||
1 | Robert L. Pearson | Electronic Security Systems | Elsevier | 2007 | ||||
2 | Lorie Faith Cranor | Security and Usability | O’Reilly | 2005 | ||||
23.2. Additional Literature | ||||||||
No. | Author | Title | Publisher | Year | ||||
1 | Mohammad S. Obaidat | Security of e-Systems and Computer Networks | Cambridge | 2007 | ||||
2 | Matt Bishop | Computer Security: Art and Science | Addison Wesley | 2002 |