|
|
Main menu for Browse IS/STAG
Course info
KKY / UBOI
:
Course description
Department/Unit / Abbreviation
|
KKY
/
UBOI
|
Academic Year
|
2023/2024
|
Academic Year
|
2023/2024
|
Title
|
Intr. to Security and Inform. Protection
|
Form of course completion
|
Exam
|
Form of course completion
|
Exam
|
Long Title
|
An Introduction into Computer Security and Information Protection
|
Accredited / Credits
|
Yes,
5
Cred.
|
Type of completion
|
Combined
|
Type of completion
|
Combined
|
Time requirements
|
Lecture
2
[Hours/Week]
Tutorial
2
[Hours/Week]
|
Course credit prior to examination
|
Yes
|
Course credit prior to examination
|
Yes
|
Automatic acceptance of credit before examination
|
Yes in the case of a previous evaluation 4 nebo nic.
|
Included in study average
|
YES
|
Language of instruction
|
Czech
|
Occ/max
|
|
|
|
Automatic acceptance of credit before examination
|
Yes in the case of a previous evaluation 4 nebo nic.
|
Summer semester
|
0 / -
|
0 / -
|
0 / -
|
Included in study average
|
YES
|
Winter semester
|
0 / -
|
0 / -
|
0 / -
|
Repeated registration
|
NO
|
Repeated registration
|
NO
|
Timetable
|
Yes
|
Semester taught
|
Winter semester
|
Semester taught
|
Winter semester
|
Minimum (B + C) students
|
10
|
Optional course |
Yes
|
Optional course
|
Yes
|
Language of instruction
|
Czech
|
Internship duration
|
0
|
No. of hours of on-premise lessons |
|
Evaluation scale |
1|2|3|4 |
Periodicity |
každý rok
|
Evaluation scale for credit before examination |
S|N |
Periodicita upřesnění |
|
Fundamental theoretical course |
No
|
Fundamental course |
No
|
Fundamental theoretical course |
No
|
Evaluation scale |
1|2|3|4 |
Evaluation scale for credit before examination |
S|N |
Substituted course
|
None
|
Preclusive courses
|
N/A
|
Prerequisite courses
|
N/A
|
Informally recommended courses
|
N/A
|
Courses depending on this Course
|
N/A
|
Histogram of students' grades over the years:
Graphic PNG
,
XLS
|
Course objectives:
|
Introduction into information system security and protection of information. Basic terminology. Security of HW. Security of SW. Secure communication. Security mechanisms enforcement. Common attacks prevention. Legal issues and privacy issues.
|
Requirements on student
|
Term assignment. Proficiency in discussed topics.
|
Content
|
1. Introduction, basic terminology, authentication, authorization, accounting 2. Cryptography, symmetric and asymmetric encryption, hash functions 3. Information system security evaluation, DoD Rainbow Series, Common Criteria Standards 4. Computer networks security, physical security, L2 security 5. Firewalls, IDS, IPS 6. Backup, monitoring of passive and active network equipment, analysis and audit of network traffic 7. Security protocols, secured protocols, data transfer security 8. Operation system security 9. High availability systems, Fault-tolerant systems 10. Smart-cards, role of cryptography in security 11. Electronic signature, web of trust, certificates, biometric systems 12. Basic kinds attacks and their prevention 13. Legal issues (Czech Republic, EU, USA). Privacy issues.
|
Activities
|
|
Fields of study
|
|
Guarantors and lecturers
|
-
Guarantors:
Prof. Ing. Luděk Müller, Ph.D. (100%),
-
Lecturer:
Prof. Ing. Luděk Müller, Ph.D. (100%),
Ing. Jan Švec, Ph.D. (100%),
-
Tutorial lecturer:
Ing. Jan Švec, Ph.D. (100%),
Ing. Daniel Tihelka, Ph.D. (100%),
|
Literature
|
-
Basic:
Hanáček P., Staudek J. Bezpečnost informačních systémů. Usus Praha, 2000.
-
Basic:
Cryptographic Compendium
(Savard J.J.G.)
-
Extending:
Toxen, Bob. Bezpečnost v Linuxu : prevence a odvracení napadení systému. Brno : Computer Press, 2003. ISBN 80-7226-716-7.
-
Extending:
Dostálek, Libor; Vohnoutová, Marta. Velký průvodce infrastrukturou PKI a technologií elektronického podpisu. Brno : Computer Press, 2006. ISBN 80-251-0828-7.
-
Recommended:
Stallings W. Cisco Networking Academy Program CCNP 1-4. Cisco Press, 2004.
-
Recommended:
Stallings W. Cryptography and Network Security. Prentice Hall, 1999.
-
Recommended:
Požár, Josef. Informační bezpečnost. Plzeň : Aleš Čeněk, 2005. ISBN 80-86898-38-5.
-
Recommended:
Kovacich, Gerald L. Průvodce bezpečnostního pracovníka informačních systémů : zavádění a prosazování bezpečnostní politiky informačních systémů. Brno : Unis, 2000. ISBN 80-86097-42-0.
-
On-line library catalogues
|
Time requirements
|
All forms of study
|
Activities
|
Time requirements for activity [h]
|
Contact hours
|
65
|
Undergraduate study programme term essay (20-40)
|
25
|
Preparation for an examination (30-60)
|
30
|
Preparation for comprehensive test (10-40)
|
10
|
Total
|
130
|
|
Prerequisites
|
Knowledge - students are expected to possess the following knowledge before the course commences to finish it successfully: |
Basic knowledge of informatics and computer science. |
popsat komunikaci klient-server v prostředí počítačových sítí |
chápat základní pojmy síťové komunikace |
aplikovat základní znalosti počítačové hardware |
Skills - students are expected to possess the following skills before the course commences to finish it successfully: |
dle zadání nastudovat dodanou dokumentaci |
použít skriptovací jazyk pro vyřešení zadaného problému |
navrhnout a implementovat program pro architekturu klient-server |
Competences - students are expected to possess the following competences before the course commences to finish it successfully: |
N/A |
N/A |
|
Learning outcomes
|
Knowledge - knowledge resulting from the course: |
Getting the basic skills of network administration and security on the Internet. |
popsat základní pojmy z oboru počítačové bezpečnosti |
dovede se orientovat v problematice zálohování počítačových systému |
vymezit problematiku internetové komunikace, firewallů, bezpečnostních a zebezpečených protokolů |
shrnout různé druhy útoků na počítačové systémy |
Skills - skills resulting from the course: |
aplikovat své znalosti pro zvýšení bezpečnosti počítačových systémů |
zdůvodnit použití konkrétních technologií pro řešení zadaného problému |
použít technologie šifrování a hashování |
Competences - competences resulting from the course: |
N/A |
N/A |
|
Assessment methods
|
Knowledge - knowledge achieved by taking this course are verified by the following means: |
Oral exam |
Test |
Seminar work |
Ústní zkouška |
Skills - skills achieved by taking this course are verified by the following means: |
Oral exam |
Continuous assessment |
Seminar work |
Průběžná evaluace |
Competences - competence achieved by taking this course are verified by the following means: |
Oral exam |
Seminar work |
Continuous assessment |
|
Teaching methods
|
Knowledge - the following training methods are used to achieve the required knowledge: |
Lecture |
Individual study |
Task-based study method |
One-to-One tutorial |
Skills - the following training methods are used to achieve the required skills: |
Individual study |
Task-based study method |
One-to-One tutorial |
Competences - the following training methods are used to achieve the required competences: |
Lecture |
Practicum |
One-to-One tutorial |
Task-based study method |
|
|
|
|