Lecturer(s)
|
-
Čapek Jan, prof. Ing. CSc.
|
Course content
|
Introduction to cryptology. Shannon coding. Symmetric and asymmetric encrypt and decrypt methods. The Vernam and Hill encrypt and decrypt methods. Public and non-public keys. Elliptic curves. Certificated authorities. Secure data transfer. Coding. Models of security systems. Data security in networks. Firewalls. Stenography.
|
Learning activities and teaching methods
|
Monologic (reading, lecture, briefing), Dialogic (discussion, interview, brainstorming), Skills training
|
Learning outcomes
|
The subject is aimed at the security of information during their data processing and data transfers. The importance of security of information will be touched (Organizational technique including cryptography).
Student will be able to apply security measurements to protect data and information technologies in practice of selected kinds of economic subjects. Student will be able to choose adequate security measurements for given situation.
|
Prerequisites
|
unspecified
|
Assessment methods and criteria
|
Oral examination, Written examination, Home assignment evaluation
The assignment is granted upon passing the final test, and presentation of the seminar paper. The examination is oral and verifies gained knowledge of presented themes.
|
Recommended literature
|
-
Bacard, A. Computer Privacy Handbook. 1995.
-
Bishop, Matt. Introduction to computer security. Boston: Addison-Wesley, 2005. ISBN 0-321-24744-2.
-
Hunter,J., H., D. Information Security Handbook. Spriongler Verlag, 2001. ISBN 1-85233-180-1.
-
Leixner,M. PC zálohování a archivace dat. Grada, 1993.
-
Menezes A. J., Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography. http://www.math.uwaterloo.ca/hac. CRC Press, 2001.
-
Schneier, B. Applied Cryptography, Protocols, Algorithms and source code in C. John Wiley, 1996. ISBN 0-471-11709-9.
-
Stallings, William. Cryptography and network security : principles and practice. Upper Saddle River: Pearson Education, 2003. ISBN 0-13-111502-2.
-
Zelenka J., Čapek J., Francek J., Janáková H. Ochrana dat. Kryptologie.. Gaudeamus, Hradec Králové, 2003.
|