Zakres i forma egzaminu dyplomowego dla studentów Wydziału Politologii i Dziennikarstwa na kierunku: IT Cyber Security – studia stacjonarne drugiego stopnia - od roku akademickiego 2024/2025
- Egzamin dyplomowy jest egzaminem ustnym.
- Na egzaminie dyplomowym student otrzymuje jedno pytanie z zakresu pracy dyplomowej oraz losuje dwa pytania z listy pytań egzaminacyjnych.
Zagadnienia na egzamin dyplomowy – IT Cyber Security, studia II stopnia
- What is cybersecurity?
- Information security, cybersecurity, and cyber defence: definitions and differences.
- Types of cybersecurity threats.
- What is information warfare?
- What is darknet?
- The analysis of technological advances in the area of cybersecurity in the last three decades - selected examples in the banking and bussines sectors.
- The challenges of maintaining cybersecurity in the banking and bussines sector.
- International Legal Regulations of Cyberspace.
- The evolution of cybersecurity regulation in the European Union Law.
- Nation-state attacks: their motivations, tactics, and implications.
- Election hacking: tools, techniques, targets, and threat actors.
- Cyber and information warfare in the Russia-Ukraine War.
- Protection of EU classified information.
- How to guarantee the effective protection of intellectual property online?
- Domain names and protection of intellectual property.
- Discuss in brief the basics of Python syntax. What does it mean that Python is an interpreted language?
- Describe three methods for getting data from the user to the program. Give an example of code that realizes one of these methods.
- Discuss the differences between lists, tuples, dictionaries, and sets in Python. Give an example of how to create a selected data type.
- List and discuss the paradigms of the object-oriented programming.
- Class, abstract class, interface -- differences and similarities.
- Design patterns in Java -- purpose and examples.
- What are hashing functions? How do they improve security of the data?
- Name a few console applications to manage files and folders. Describe three of them.
- File attributes in Linux.
- Name a few methods in Linux that help protect the system from intruders and potential OS damage.
- Pros and cons of using virtualization in Linux.
- Cryptography and Network Security protocols. Explain how TLS and IPSec protocols work.
- Describe techniques for managing network traffic to ensure service quality.
- What is VLSM used for?
- Describe Zigbee
|