Lecturer(s)
|
-
Maškov Viktor, doc. RNDr. Mgr. DrSc.
-
Krejčí Jan, RNDr. Ph.D.
|
Course content
|
1. Introduction to problematics. Security policy. 2. Autentication, Authorization, Accounting. 3. Types and priciples of attacks. 4. Malware (viruses, worms, adware, spyware). 5. Safety communication (IPsec, SSH, SSL). VPN. 6. Firewalls. 7. Security in IPv6. 8. Wireless networks security.
|
Learning activities and teaching methods
|
unspecified
|
Learning outcomes
|
This course will deal with data transfer security in distributed surroudings in a not-safe networks and information systems. The important part of the course will be devoted the technology of three "A", it means authentication, authorization and accounting and access control, cryptography, data integrity, keys distributing, types of attack against transfered data, firewalls, etc.
|
Prerequisites
|
Teaching in English is meant only for erasmus and foreign students. In the case of a small number of students is teaching in a form of individual consultations.
|
Assessment methods and criteria
|
unspecified
- minimum 80% attendance, full attendance at invited lectures - article on security (created in LaTeX, 15 pages long)
|
Recommended literature
|
-
Dostálek L. a kol. Velký průvodce protokoly TCP/IP: bezpečnost. Computer Press, 2003.
-
Dostálek L., Kabelová A. Velký průvodce protokoly TCP/IP a systémem DNS. null. Computer Press, 2003. ISBN null.
-
Naik D. C. Internet: standardy a protokoly. Computer Press, Brno, 1999.
-
Pužmanová R. TCP/IP v kostce. null. Kopp, Č. Budějovice, 2003. ISBN null.
-
Strebe M., Perkins C. Firewally a proxy-servery. Computer Press, Brno, 2003.
|