|
|
Main menu for Browse IS/STAG
Course info
KKY / BSOI
:
Course description
Department/Unit / Abbreviation
|
KKY
/
BSOI
|
Academic Year
|
2023/2024
|
Academic Year
|
2023/2024
|
Title
|
Biomet. Sys. and Information Protection
|
Form of course completion
|
Exam
|
Form of course completion
|
Exam
|
Long Title
|
Biometric Systems and Information Protection
|
Accredited / Credits
|
Yes,
5
Cred.
|
Type of completion
|
Combined
|
Type of completion
|
Combined
|
Time requirements
|
Lecture
2
[Hours/Week]
Tutorial
2
[Hours/Week]
|
Course credit prior to examination
|
Yes
|
Course credit prior to examination
|
Yes
|
Automatic acceptance of credit before examination
|
Yes in the case of a previous evaluation 4 nebo nic.
|
Included in study average
|
YES
|
Language of instruction
|
Czech
|
Occ/max
|
|
|
|
Automatic acceptance of credit before examination
|
Yes in the case of a previous evaluation 4 nebo nic.
|
Summer semester
|
0 / -
|
0 / -
|
0 / -
|
Included in study average
|
YES
|
Winter semester
|
0 / -
|
12 / -
|
0 / -
|
Repeated registration
|
NO
|
Repeated registration
|
NO
|
Timetable
|
Yes
|
Semester taught
|
Winter semester
|
Semester taught
|
Winter semester
|
Minimum (B + C) students
|
10
|
Optional course |
Yes
|
Optional course
|
Yes
|
Language of instruction
|
Czech
|
Internship duration
|
0
|
No. of hours of on-premise lessons |
|
Evaluation scale |
1|2|3|4 |
Periodicity |
každý rok
|
Evaluation scale for credit before examination |
S|N |
Periodicita upřesnění |
|
Fundamental theoretical course |
No
|
Fundamental course |
Yes
|
Fundamental theoretical course |
No
|
Evaluation scale |
1|2|3|4 |
Evaluation scale for credit before examination |
S|N |
Substituted course
|
None
|
Preclusive courses
|
N/A
|
Prerequisite courses
|
N/A
|
Informally recommended courses
|
N/A
|
Courses depending on this Course
|
N/A
|
Histogram of students' grades over the years:
Graphic PNG
,
XLS
|
Course objectives:
|
The goal of the subject is to give the students information about various biometric technologies (e.g. fingerprints, voice, handwriting, retina, iris, DNA) and about their usage in information and security systems. Introduction into information system security and protection of information. Basic terminology. Security of HW. Security of SW. Secure communication. Security mechanisms enforcement. Common attacks prevention. Legal issues and privacy issues.
|
Requirements on student
|
Credit: Seminar work. Proficiency in discussed topics.
Exam: knowledge corresponding to the extent of the course (lectures + seminars)
|
Content
|
1. Biometrics. Basic processing of biometric information.
2. Recognition and classification in security systems.
3. Security systems exploiting fingerprints and hand geometry. Security based on handwriting.
4. Voice security systems.
5. Security based on face characteristics. Security systems exploiting retina and iris patterns.
6. Biometric characteristics of DNA.
7. Introduction, basic terminology, authentication, authorization, accounting
8. Cryptography, symmetric and asymmetric encryption, hash functions
9. Computer networks security, physical security, L2 security
10. Firewalls, analysis and audit of network traffic, IDS, IPS
11. Backup, monitoring of passive and active network equipment
12. Security protocols, secured protocols, data transfer security
13. Basic kinds attacks and their prevention
|
Activities
|
|
Fields of study
|
Studentům je po začátku příslušného semestru k dispozici kurz v Google Classroom se všemi podstatnými studijními podklady.
|
Guarantors and lecturers
|
|
Literature
|
-
Basic:
Drahanský, Martin; Orság, Filip. Biometrie. 1. vyd. [Brno : M. Drahanský], 2011. ISBN 978-80-254-8979-6.
-
Basic:
Rak, Roman; Matyáš, Vašek,; Říha, Zdeněk. Biometrie a identita člověka ve forenzních a komerčních aplikacích. 1. vyd. Praha : Grada, 2008. ISBN 978-80-247-2365-5.
-
Basic:
Stallings, William; Brown, Lawrie. Computer security : principles and practice. 2018. ISBN 978-1-292-22061-1.
-
Basic:
Kolouch, Jan; Bašta Pavel a kol. Cybersecurity. Edice CZ.NIC, 2019.
-
Basic:
Burda, Karel. Kryptografie okolo nás. 2019. ISBN 978-80-88168-52-2.
-
Extending:
Zhang, David D. Automated biometrics : technologies and systems. Boston : Kluwer Academic Publishers, 2000. ISBN 0-7923-7856-3.
-
Extending:
Toxen, Bob. Bezpečnost v Linuxu : prevence a odvracení napadení systému. Brno : Computer Press, 2003. ISBN 80-7226-716-7.
-
Extending:
Pankanti, Sharath; Jain, Anil K.; Bolle, Ruud. Biometrics : personal identification in networked society. Boston : Kluwer Academic Publishers, 1999. ISBN 0-7923-8345-1.
-
Extending:
Cryptographic Compendium
(Savard J.J.G.)
-
Extending:
Bitto, Ondřej. Šifrování a biometrika, aneb, Tajemné bity a dotyky. Kralice na Hané : Computer Media, 2005. ISBN 80-86686-48-5.
-
Extending:
Dostálek, Libor; Vohnoutová, Marta. Velký průvodce infrastrukturou PKI a technologií elektronického podpisu. Brno : Computer Press, 2006. ISBN 80-251-0828-7.
-
Recommended:
Stallings W. Cisco Networking Academy Program CCNP 1-4. Cisco Press, 2004.
-
Recommended:
Stallings W. Cryptography and Network Security. Prentice Hall, 1999.
-
Recommended:
Požár, Josef. Informační bezpečnost. Plzeň : Aleš Čeněk, 2005. ISBN 80-86898-38-5.
-
Recommended:
Kovacich, Gerald L. Průvodce bezpečnostního pracovníka informačních systémů : zavádění a prosazování bezpečnostní politiky informačních systémů. Brno : Unis, 2000. ISBN 80-86097-42-0.
-
On-line library catalogues
|
Time requirements
|
All forms of study
|
Activities
|
Time requirements for activity [h]
|
Undergraduate study programme term essay (20-40)
|
30
|
Preparation for an examination (30-60)
|
48
|
Contact hours
|
26
|
Practical training (number of hours)
|
26
|
Total
|
130
|
|
Prerequisites
|
Knowledge - students are expected to possess the following knowledge before the course commences to finish it successfully: |
use basic knowledge of informatics and computer science |
Skills - students are expected to possess the following skills before the course commences to finish it successfully: |
apply basic knowledge of informatics and computer science |
Competences - students are expected to possess the following competences before the course commences to finish it successfully: |
N/A |
N/A |
N/A |
N/A |
N/A |
|
Learning outcomes
|
Knowledge - knowledge resulting from the course: |
explain the principle of various biometric technologies (e.g. fingerprints, voice, handwriting, retina, iris, DNA) |
evaluate reliability and efficiency of various biometric technologies |
compare principles of various security systems |
knowledge of basic skills of network administration and security on the Internet |
Skills - skills resulting from the course: |
analyze capabilities of various biometrics in concrete security systems |
design security systems for real aplications |
ability of basic network administration and security on the Internet |
Competences - competences resulting from the course: |
N/A |
|
Assessment methods
|
Knowledge - knowledge achieved by taking this course are verified by the following means: |
Combined exam |
Seminar work |
Test |
Skills - skills achieved by taking this course are verified by the following means: |
Combined exam |
Skills demonstration during practicum |
Seminar work |
Competences - competence achieved by taking this course are verified by the following means: |
Combined exam |
Seminar work |
Skills demonstration during practicum |
|
Teaching methods
|
Knowledge - the following training methods are used to achieve the required knowledge: |
Lecture |
Lecture with visual aids |
Practicum |
Self-study of literature |
Individual study |
Skills - the following training methods are used to achieve the required skills: |
Lecture |
Lecture with visual aids |
Practicum |
Individual study |
Self-study of literature |
Competences - the following training methods are used to achieve the required competences: |
Lecture |
Lecture with visual aids |
Practicum |
Self-study of literature |
Individual study |
|
|
|
|