Lecturer(s)
|
-
Krejčí Jan, RNDr. Ph.D.
-
Maškov Viktor, doc. RNDr. Mgr. DrSc.
|
Course content
|
1. Information security - basic axioms, principles, classification, tools. 2. Information security management systems - services, methods, verification of security 3. Analysis of the threats and risks - assets, threats, vulnerabilities, risks, threats, countermeasures. 4 Contemporary threats of information technologies - types, techniques, options. 5 AAA framework - principles, classification, purpose, use. 6 Infrastructure PKI - basic axioms, dig. signature, hash functions, use. 7 Infrastructure PKI - dig. certificate, certificate authority. 8 Computer security - basic defensive / protective technologies, techniques, tools and methods. 9 Data security - the life cycle of data, data distribution, backup and deletion of data. 10 Principles of security and protection of data in a computer network (in the Internet). 11. Protocols and methods of security and of safety data in a computer network (in the Internet). 12. Data protection of wireless networks - principles, classification, use.
|
Learning activities and teaching methods
|
unspecified
|
Learning outcomes
|
The course is designed as a basic introduction to the security field of information technology with an emphasis on basic concepts, methods, principles and techniques used in specific areas. Subject describes the system management data security, the types of analyzes and appropriate countermeasures. It analyzes different types and principles of threats, the most common defense / protection technologies including a general description of the basic methods of protecting data and information on the level of network and computer itself. Subject explains the certification process and the principles of eGovernment including a quality standards of information security management .
|
Prerequisites
|
Fundamentals of computer networks, encryption and management of operating systems.
KI/DEP
|
Assessment methods and criteria
|
unspecified
Active participation in seminars (min. 80%), seminar work in the range of 15 standard pages (15x1800 characters).
|
Recommended literature
|
-
Bitto O. Jak zabezpečit domácí a malou síť Windows XP. Computer Press, Praha, 2006. ISBN 80-251-1098-0.
-
Dostálek L., Vohnoutová M. Velký průvodce infrastrukturou PKI a technologií elektronického podpisu. Computer Press, Praha, 2010. ISBN 978-80-251-2619-6.
-
Král M. Bezpečnost domácího počítače. Grada Publishing, Praha, 2006. ISBN 80-247-1408-6.
-
Lidinský V., Švarcová I., Budiš P., Loebl Z., Procházková B. eGovernment bezpečně. Grada Publishing, Praha, 2008. ISBN 978-80-247-2462-1.
-
Northcutt S. Bezpečnost počítačových sítí. Computer Press, Praha, 2005. ISBN 80-251-0697-7.
-
Pužmanová R. Bezpečnost bezdrátové komunikace. Computer Press, Praha, 2005. ISBN 80-251-0791-4.
|