Course: Theory of Information and Data Security

» List of faculties » REK » FES
Course title Theory of Information and Data Security
Course code FES/DTZIM
Organizational form of instruction Lecture
Level of course Doctoral
Year of study not specified
Semester Winter and summer
Number of ECTS credits 10
Language of instruction Czech
Status of course Compulsory-optional
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Čapek Jan, prof. Ing. CSc.
  • Hub Miloslav, doc. Ing. Ph.D.
Course content
Introduction to cryptology, Shannon's theory of encryption, Vernam's and Hill's cipher. Symmetric and asymmetric ciphers- methods, advantages and disadvantages, modern methods approach. Elliptic curves, Certification authority and protocols. Secure data transmission, Coding, Safe systems models, Data safety in networks, Steganography, Watermarking.

Learning activities and teaching methods
Dialogic (discussion, interview, brainstorming)
Learning outcomes
The aim of this course is learn theoretical knowledge about data security, secure data transfer and processing, focus on the organisational precaution include encryption. The student will be able to apply data security and information protection methods in praxis of the specific economic subjects, he/she will be able to chose suitable methods of information protection within the chosen subject.
The student will be able to apply data security and information protection methods in praxis of the specific economic subjects, he/she will be able to chose suitable methods of information protection within the chosen subject. Student will be able use within her/his doctoral thesis acquired knowledge.
Prerequisites
unspecified

Assessment methods and criteria
Oral examination

T
Recommended literature
  • Bacard, A. Computer Privacy Handbook. 1995.
  • Bishop, Matt. Introduction to computer security. Boston: Addison-Wesley, 2005. ISBN 0-321-24744-2.
  • Hunter,J., H., D. Information Security Handbook. Spriongler Verlag, 2001. ISBN 1-85233-180-1.
  • Leixner,M. PC zálohování a archivace dat. Grada, 1993.
  • Menezes A. J., Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography. http://www.math.uwaterloo.ca/hac. CRC Press, 2001.
  • Schneier, B. Applied Cryptography, Protocols, Algorithms and source code in C.. John Wiley, 1996. ISBN 0-471-11709-9.
  • Stallings, William. Cryptography and network security : principles and practice. Upper Saddle River: Pearson Education, 2003. ISBN 0-13-111502-2.
  • Zelenka J., Čapek J., Francek J., Janáková H. Ochrana dat. Kryptologie.. Gaudeamus, Hradec Králové, 2003.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester
Faculty: Faculty of Economics and Administration Study plan (Version): Management (2013) Category: Economy - Recommended year of study:-, Recommended semester: -
Faculty: Faculty of Economics and Administration Study plan (Version): Management (2013) Category: Economy - Recommended year of study:-, Recommended semester: -