|
Lecturer(s)
|
-
Hub Miloslav, doc. Ing. Ph.D.
|
|
Course content
|
Security features and security mechanisms. Authentication. Authorization. Viruses, malicious code. Social engineering. Cryptology. Electronic signature and public key infrastructure. Act on Archiving and Records Service. Risk analysis. Security policy. Business Process Continuity Plan. Disaster Recovery Plan. Physical security.
|
|
Learning activities and teaching methods
|
Monologic (reading, lecture, briefing), Dialogic (discussion, interview, brainstorming), Demonstration
- Individual project
- 41 hours per semester
- Contact teaching
- 39 hours per semester
- Preparation for an exam
- 50 hours per semester
- Data/material collection
- 20 hours per semester
|
|
Learning outcomes
|
The aim of the course is to acquire knowledge of basic terminology and basic issues in the field of security and information protection with an emphasis on the ability to use acquired knowledge in solving specific tasks.
A student who has successfully completed the course can: describe the basic objectives of information security; classify security mechanisms into categories; classify encryption algorithms into individual categories; explain the meaning and principle of electronic signature; describe the selection and registration of archival materials, the protection of archival materials, the rights and obligations of archive holders, the rights and obligations of holders and administrators of archival materials, the use of archival materials, the processing of personal data for archival purposes, describe the system of archives, the rights and obligations of archival founders; explain the importance of risk analysis and describe its progress; explain the importance of security policy and describe its types. A student who has successfully completed the course can: make appropriate use of cryptographic tools; use the electronic signature appropriately; be familiar with the Act on Archiving and Records Management; carry out an indicative risk analysis; implement the firm's security policy. The student who has successfully completed the course is able to: to include a consideration of their legal dimension in problem solving; to communicate in a clear and convincing way to professionals and lay people information on the nature of professional issues and their own opinion on their solution.
|
|
Prerequisites
|
unspecified
|
|
Assessment methods and criteria
|
Home assignment evaluation, Didactic test, Systematic monitoring
Assigment: participation in exercises (see guidelines), elaboration of assigned tasks for exercises. Exam: electronic test with at least 70% success rate. Requirements will be specified in the first exercise.
|
|
Recommended literature
|
-
Stewart J. M.,Tittel E., Chapple M. CISSP - Certified Information Systems Security Professional Study Guide. Sybex, 2011. ISBN 978-0470944981.
|