|
Lecturer(s)
|
-
Kysela Jiří, Ing. Ph.D.
-
Pozdílek Martin, Ing. Ph.D.
-
Hejduk Jiří, Bc.
|
|
Course content
|
1. Introduction to cybersecurity 2. ISO 27000, risk management 3. Cryptography 4. Advanced cryptography 5. Access control, human resources security 6. Physical security 7. Hardware security 8. Operating system and database security 9. Network Connectivity 10. Secure Application Development 11. Traffic Management 12. Monitoring 13. Computer Crime
|
|
Learning activities and teaching methods
|
Monologic (reading, lecture, briefing), Dialogic (discussion, interview, brainstorming), Methods of individual activities, Skills training
- Practical training
- 22 hours per semester
- Preparation for an exam
- 30 hours per semester
- Contact teaching
- 22 hours per semester
- Preparation of a presentation (report)
- 8 hours per semester
- Preparation for a credit (assessment)
- 8 hours per semester
- Home preparation for classes
- 60 hours per semester
|
|
Learning outcomes
|
The aim of the course is to familiarize students with the design of a secure information system and the information security management system in a company. After completing the course, students will gain knowledge in the field of information system security and information security management.
Students are going to gain knowledge about information systems security and about a set of policies connected with information security management.
|
|
Prerequisites
|
unspecified
|
|
Assessment methods and criteria
|
Written examination, Home assignment evaluation, Discussion, Self project defence, Presentation
Credit Presentations on security topics Obtaining a minimum of 7 points in the exercises Exam Exam test, 40 questions for 30 min A: <100; 92.5>% 40 - 37 points B: (92.5; 85>% - 36.9 - 34 points C: (85; 77.5>% - 33.9 - 31 points D: (77.5; 70>% - 30.9 - 28 points E: (70 ; 62.5>% - 27.9 - 25 points F: (62.5; 0)% - less than 25 points
|
|
Recommended literature
|
-
BUDIŠ, Petr. Elektronický podpis a jeho aplikace v praxi. Praha: Nakladatelství ANAG, 2008. ISBN 978-80-7263-465-1. S:162..
-
ČSN ISO/IEC 27001. Informační technologie-Bezpečnostní techniky-Systémy managementu bezpečnosti informací - Požadavky. Praha: Český normalizační institut, 2006. 36s..
-
HANÁČEK, P; STAUDEK, J. Bezpečnost informačních systémů. Praha: Úřad pro státní informační systém, 2000. ISBN: 80-23854-00-3. S: 127..
-
JOINT TASK FORCE TRANSFORMATION INITIATIVE. Information security. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology. Gaithersburg 2011, MD 20899-8930. March 2011. Dostupný z WWW: < http://csrc.nist.gov>..
-
KOLOUCH, Jan. CyberCrime. 1. vydání, Praha: CZ.NIC, z.s.p.o. , 2016. ISBN 978-80-88168-18-8. S: 528. Dostupný z WWW: < http://www.nic.cz>..
-
MACHÁČEK, Miloslav. Cloud Computing and Security of Information Assets. Annual International Interdisciplinary Conference, AIIC 2014. University of the Azores, Ponta Delgada, 8-12 July 2014, Azores Islands, Portugal. p. 428. ISBN 978-608-4642-26-8..
-
PATTINSON, F. Certifying Information Security Management Systems. CISSP, CSDP, Atsec information security corporation. Dostupný z WWW: < http://www.atsec.com>..
|