Course: Computer Systems Security

« Back
Course title Computer Systems Security
Course code KIN/XBIS
Organizational form of instruction no contact
Level of course Doctoral
Year of study not specified
Semester Winter and summer
Number of ECTS credits 10
Language of instruction Czech
Status of course Compulsory-optional
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Beránek Ladislav, doc. Ing. CSc.
Course content
Topics: 1. Principles of IS/IT security; 2. Fundamental principles. Authorization and autentization; 3. Types of attacks and their aims; 4. Methods of business IS/IT security; 5. Risk analysis, disaster recovery plan; 6. Principles of IS/IT security evaluation. Survey of standards for security evaluation IS/IT - CSN 17799, ISO/IEC 27001; 7. Principles of modern cryptography. The process of encryption and decipherment, cryptoanalysis; 8. Symmetrical and asymmetrical cryptography algorithms; 9. Known standards and implementation. Hash function; 10. Electronic signature. PKI, certification authority; 11. Principles of computer network security and computers; 12. Network security monitoring and administration. Monitoring and audit; 13. IDS, penetration tests.

Learning activities and teaching methods
Dialogic (discussion, interview, brainstorming)
Learning outcomes

Students will understand basic principle of IS/IT security, will be able to perform elementary security analysis and will have survey about security technologies and security architectures used in business practice.
Prerequisites
The course has no prerequisities.

Assessment methods and criteria
Student performance assessment, Seminar work, Development of laboratory protocols

Credit Requirements: Active participation in seminars, working out a seminar work (audit of information system, DMZ, firewall, PKI etc.) Examination Requirements: - Final written test
Recommended literature
  • Brown, L., Stallings, W. Computer Security: Principles and Practice. New York: Pearson, 2014. ISBN 978-0133773927.
  • Chapman, D. B., Zwicky, E. D. Firewally: principy budování a udržování. Brno: Computer Press, 1998. ISBN 80-7226-051-0.
  • Schneier, B. Applied Cryptography.. New York: John Willey, 1996. ISBN 0-471-11709-9.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester
Faculty: Faculty of Education Study plan (Version): Information and communication technology in education (2) Category: Pedagogy, teacher training and social care - Recommended year of study:-, Recommended semester: -
Faculty: Faculty of Education Study plan (Version): Information and communication technology in education (2) Category: Pedagogy, teacher training and social care - Recommended year of study:-, Recommended semester: -