Course: null

» List of faculties » FEK » KMI
Course title -
Course code KMI/CBOS
Organizational form of instruction Lecture
Level of course Bachelor
Year of study not specified
Semester Winter
Number of ECTS credits 5
Language of instruction Czech
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Fesl Jan, Ing. Ph.D.
  • Remeš Radim, Mgr. Ph.D.
Course content
Lectures: 1. Principles of IS/IT security; 2. Fundamental principles. Authorization and autentization; 3. Types of attacks and their aims; 4. Methods of business IS/IT security; 5. Risk analysis, disaster recovery plan; 6. Principles of IS/IT security evaluation. Survey of standards for security evaluation IS/IT - CSN 17799, ISO/IEC 27001; 7. Principles of modern cryptography. The process of encryption and decipherment, cryptoanalysis; 8. Symmetrical and asymmetrical cryptography algorithms; 9. Known standards and implementation. Hash function; 10. Electronic signature. PKI, certification authority; 11. Principles of computer network security and computers; 12. Network security monitoring and administration. Monitoring and audit; 13. IDS, penetration tests.

Learning activities and teaching methods
Monologic (reading, lecture, briefing), Demonstration, E-learning
  • Class attendance - 16 hours per semester
  • Semestral paper - 40 hours per semester
  • Preparation for credit - 22 hours per semester
  • Preparation for exam - 22 hours per semester
  • Preparation for classes - 42 hours per semester
Learning outcomes
The aim of the course is to acquaint students with the basic principles of security of products and systems based on information technologies. The subject covers safety issues in building and operating information systems. During the semester the students will be acquainted with all areas of information system security and with basic standards related to this area.
Students will understand basic principle of IS/IT security, will be able to perform elementary security analysis and will have survey about security technologies and security architectures used in business practice.
Prerequisites
The course has no prerequisities.

Assessment methods and criteria
Oral examination, Test

Credit Requirements: Active participation in seminars, working out a seminar work (audit of information system, DMZ, firewall, PKI etc.) Examination Requirements: Final written test
Recommended literature
  • DOSTÁLEK, L. a kol. TCP/IP - bezpečnost. Praha: Computer Press, 2003. ISBN 80-7226-849-X.
  • DOSTÁLEK, Libor, Marta VOHNOUTOVÁ a Miroslav KNOTEK. Velký průvodce infrastrukturou PKI a technologií elektronického podpisu. Brno: Computer Press, 2009. ISBN 9788025126196.
  • DOUCEK, Petr. Řízení bezpečnosti informací: 2. rozšířené vydání o BCM. 2., přeprac. vyd.. Praha: Professional Publishing, 2011. ISBN 978-80-7431-050-8.
  • SCHNEIER, B. Applied Cryptography. New York: John Willey, 1996. ISBN 0-471-11709-9.
  • VACCA, John R. Computer and information security handbook. Cambridge, MA: Morgan Kaufmann Publishers, an imprint of Elsevier, 2017. ISBN 9780128038437.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester