Lecturer(s)
|
-
Krejčí Jan, RNDr. Ph.D.
-
Maškov Viktor, doc. RNDr. Mgr. DrSc.
|
Course content
|
1. Information security - basic axioms, principles, classification, tools. 2. Information security management systems - services, methods, verification of security 3. Analysis of the threats and risks - assets, threats, vulnerabilities, risks, threats, countermeasures. 4 Contemporary threats of information technologies - types, techniques, options. 5 AAA framework - principles, classification, purpose, use. 6 Infrastructure PKI - basic axioms, dig. signature, hash functions, use. 7 Infrastructure PKI - dig. certificate, certificate authority. 8 Computer security - basic defensive / protective technologies, techniques, tools and methods. 9 Data security - the life cycle of data, data distribution, backup and deletion of data. 10 Principles of security and protection of data in a computer network (in the Internet). 11. Protocols and methods of security and of safety data in a computer network (in the Internet). 12. Data protection of wireless networks - principles, classification, use.
|
Learning activities and teaching methods
|
unspecified
|
Learning outcomes
|
The course is designed as a basic introduction to the security field of information technology with an emphasis on basic concepts, methods, principles and techniques used in specific areas. Subject describes the system management data security, the types of analyzes and appropriate countermeasures. It analyzes different types and principles of threats, the most common defense / protection technologies including a general description of the basic methods of protecting data and information on the level of network and computer itself. Subject explains the certification process and the principles of eGovernment including a quality standards of information security management .
|
Prerequisites
|
unspecified
KI/KDEP
|
Assessment methods and criteria
|
unspecified
|
Recommended literature
|
-
Bitto O. Jak zabezpečit domácí a malou síť Windows XP. Computer Press, Praha, 2006. ISBN 80-251-1098-0.
-
Dostálek L., Vohnoutová M. Velký průvodce infrastrukturou PKI a technologií elektronického podpisu. Computer Press, Praha, 2010. ISBN 978-80-251-2619-6.
-
Král M. Bezpečnost domácího počítače. Grada Publishing, Praha, 2006. ISBN 80-247-1408-6.
-
Lidinský V., Švarcová I., Budiš P., Loebl Z., Procházková B. eGovernment bezpečně. Grada Publishing, Praha, 2008. ISBN 978-80-247-2462-1.
-
Northcutt S. Bezpečnost počítačových sítí. Computer Press, Praha, 2005. ISBN 80-251-0697-7.
-
Pužmanová R. Bezpečnost bezdrátové komunikace. Computer Press, Praha, 2005. ISBN 80-251-0791-4.
|