Course title | Means of Personal Identification, Biometry, Smart Cards |
---|---|
Course code | UAI/719 |
Organizational form of instruction | Lecture |
Level of course | Bachelor |
Year of study | not specified |
Frequency of the course | In each academic year, in the winter semester. |
Semester | Winter |
Number of ECTS credits | 3 |
Language of instruction | Czech |
Status of course | Compulsory |
Form of instruction | unspecified |
Work placements | unspecified |
Recommended optional programme components | None |
Lecturer(s) |
---|
|
Course content |
Content of lectures: " identification, authentication, authorization - definitions " ways of identification " ways of authentication " one and more-factor methods " authentication based on knowledge (I know) " authentication based on ownership (I have) " authentication calculators and tools and their features " authentication based on biometry (I am) " features of biometric technologies " biometric items and their processing " modern methods - cognitive authentication " more-factor methods " the problematic of the "turing test" - proving of a man's presence in a process
|
Learning activities and teaching methods |
Monologic (reading, lecture, briefing), Demonstration
|
Learning outcomes |
As a goal of this course the studen will get knowledge in the field of identification, authentication and authorization. Both theoretical and practical aspect of the identification and authorization processes is included. Equiped with knowledge from this course the student will be able to design and/or evaluate design of identification, authentication and authorization functions of an ifnormation system while considering security, organizational and technological features of the solution.
The student acquires overview in the field of identification and authentication. STudent learns the terminology, methods of authentication and its features. Student is able to design and assess implementation of authentication in the information system. |
Prerequisites |
Basic knowledge in the area of computer networks (TCP/IP, HTTP) Basic knowledge in the area of applied cryptography - hash functions, asymmetric cryptography
|
Assessment methods and criteria |
Combined exam
A 90 % pass rate in basic knowledge and orientation of the subject matter and a 50 % pass rate in detailed knowledge is required for successful completion. 75 % pass rate in the written test. |
Recommended literature |
|
Study plans that include the course |
Faculty | Study plan (Version) | Category of Branch/Specialization | Recommended semester | |
---|---|---|---|---|
Faculty: Faculty of Science | Study plan (Version): Applied Informatics (1) | Category: Informatics courses | - | Recommended year of study:-, Recommended semester: Winter |
Faculty: Faculty of Science | Study plan (Version): Applied Informatics (1) | Category: Informatics courses | - | Recommended year of study:-, Recommended semester: Winter |
Faculty: Faculty of Science | Study plan (Version): Applied Informatics (1) | Category: Informatics courses | - | Recommended year of study:-, Recommended semester: Winter |
Faculty: Faculty of Science | Study plan (Version): Applied Informatics (1) | Category: Informatics courses | - | Recommended year of study:-, Recommended semester: Winter |
Faculty: Faculty of Science | Study plan (Version): Applied Informatics (1) | Category: Informatics courses | - | Recommended year of study:-, Recommended semester: Winter |