Description
Direction of Techno-Economic Management of Digital Systems
Knowledge
- Business, financial, regulatory, and legal context of telecommunication businesses and organisations.
- Administrative chain of command in businesses.
- Structure, principles of operation and characteristics of modern telecommunications infrastructures.
- Basic concepts of network-oriented systems and services.
- Techno-economic analysis of new products and services.
- Strategic management for digital businesses.
- Concepts and uses of IT systems producing information for the definition and achievement of organisation objectives.
- Governance and administration of projects of digital systems.
- Analysis of financial records of businesses.
- Promotion of technological products and services.
Competences
- Study of the financial aspect of network-oriented systems and services by analysing the usefulness thereof, the relevant investment criteria for new technologies and services, as well as the method for managing business procedures.
- Analysis of composite business problems.
- Creation of modern architectures based on the world wide web, in process-oriented and service-oriented architectures.
- Application of best practices for project management.
- Analysis of sources for business financing, calculation of capital cost and evaluation of businesses based on key volumes.
Skills
- Design and evaluation of the chain of command for taking decisions, scheduling, and controlling the actions of a business.
- Taking of decision for companies / organisations, based on the best practices.
- Development of IT systems in order to achieve new comparative advantages for organisations.
- Project management and governance of digital systems with the best possible practices.
- Analysis and formulation of financial elements (e.g. share capital) and policies (e.g. dividends policy) for businesses.
- Promotion of technological products and services to competitive environments.
Direction of Digital System Security
Knowledge
- Security analysis of computer networks.
- Effective management of security and identification of management problems.
- Evaluation and exploitation of software problems.
- Principles of cryptography, algorithms, and protocols.
- Risk analysis and management for an IT and communication system.
- Specification of the security policy of an organisation based on a complete data analysis.
- Security analysis for mobile and wireless new generation networks.
- Techniques and tools used in digital forensics.
- Institutional and legal issues on security / regulatory environment.
- Formulation of requirements for privacy and method of recording.
- New technologies and methods for dealing with issues on security and privacy through research activities.
Competences
- Specification of security requirements for the network system, threat / risk analysis.
- Evaluation of requirements for managing security and of operation / financial impacts.
- Design of case reporting system.
- Security study for an IT system, using penetration testing methodologies and techniques.
- Specification of cryptography limits and types of cryptographic mechanisms.
- Assessment of risk consequences in cyberspace.
- Evaluation of effectiveness and efficiency of security architecture for wireless networks.
- Analysis of digital indications in computer hard drives and RAM memories, following methodologies and practices of digital forensics.
- Location and extraction of digital data from network-circulating files.
- Location of basic issues of law related to the security of an IT system.
- Evaluation and adoption based on cases studies of the basic regulatory rules and principles comprising the regulatory context.
- Evaluation of existing mechanism for the protection of user privacy.
Skills
- Design of security mechanisms and protocols.
- Evaluation of effectiveness and efficiency of network security architecture.
- Management of identity and measurement of security level in IT systems.
- Design and execution of shell code using Assembly programming language.
- Analysis and evaluation of source code in order to detect new weaknesses.
- Formulation of security requirements and evaluation / proposal of suitable encryption mechanisms.
- Implementation of identification, authentication, and access control mechanisms.
- Analysis of threats / operation risks, of effectiveness, efficiency, and privacy of wireless network system.
- Design, development and evaluation of methods of static and dynamic analysis of malicious code.
- Security control in internet applications.
- Search for and application of solutions that agree with the regulatory framework.
Relation to Employment
Access Requirements / Progression Opportunities
Knowledge
Skills
Competences