Lecturer(s)
|
-
Kopáčková Hana, doc. Ing. Ph.D.
-
Čapek Jan, prof. Ing. CSc.
-
Hub Miloslav, doc. Ing. Ph.D.
-
Tomeš Milan, Ing.
|
Course content
|
Introduction to cryptology. Shannon coding. Symmetric and asymmetric encrypt and decrypt methods. The Vernam and Hill encrypt and decrypt methods. Public and non-public keys. Elliptic curves. Certificated authorities. Secure data transfer. Coding. Models of security systems. Data security in networks. Firewalls. Stenography.
|
Learning activities and teaching methods
|
Monologic (reading, lecture, briefing), Dialogic (discussion, interview, brainstorming), Skills training
|
Learning outcomes
|
The aim of the course is to master theoretical knowledge about the information security upon its processing by the means of computer technology and its transfers. Furthermore, the course is designed to help students to understand diverse proceedings ranging from the organizational to technical ones, including coding.
Students will be able to apply methods of data security and protection in the practice of specific economic subjects as well as to choose the appropriate methods of data security and protection in the particular subject.
|
Prerequisites
|
unspecified
|
Assessment methods and criteria
|
Oral examination, Written examination, Home assignment evaluation
The assignment is granted upon completion of the following conditions: active attendance at seminars, passing the final test, presentation of the seminar paper on a firm security. The examination is oral and verifies gained knowledge of presented themes.
|
Recommended literature
|
-
Bishop, Matt. Introduction to computer security. Boston: Addison-Wesley, 2005. ISBN 0-321-24744-2.
-
Leixner, M. PC zálohování a archivace dat.. GRADA, 1993.
-
Menezes A. J., Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography. http://www.math.uwaterloo.ca/hac. CRC Press, 2001.
-
Schneier, B. Applied Cryptography, Protocols, Algorithms and source code in C.. John Wiley, 1996. ISBN 0-471-11709-9.
-
Stallings, William. Cryptography and network security : principles and practice. Upper Saddle River: Pearson Education, 2003. ISBN 0-13-111502-2.
-
Stinson, Douglas Robert. Cryptography : theory and practice. Boca Raton: Chapman & Hall, 2002. ISBN 1-58488-206-9.
-
Zelenka J., Čapek J., Francek J., Janáková H. Ochrana dat. Kryptologie.. Gaudeamus, Hradec Králové, 2003.
|