Lecturer(s)
|
-
Čapek Jan, prof. Ing. CSc.
|
Course content
|
Introduction to cryptology, Shannon's theory of encryption, Vernam's and Hill's cipher. Symmetric and asymmetric ciphers- methods, advantages and disadvantages, modern methods approach. Elliptic curves, Certification authority and protocols. Secure data transmission, Coding, Safe systems models, Data safety in networks, Steganography, Watermarking.
|
Learning activities and teaching methods
|
Dialogic (discussion, interview, brainstorming)
|
Learning outcomes
|
The aim of this course is learn theoretical knowledge about data security, secure data transfer and processing, focus on the organisational precaution include encryption. The student will be able to apply data security and information protection methods in praxis of the specific economic subjects, he/she will be able to chose suitable methods of information protection within the chosen subject.
The student will be able to apply data security and information protection methods in praxis of the specific economic subjects, he/she will be able to chose suitable methods of information protection within the chosen subject. Student will be able use within her/his doctoral thesis acquired knowledge.
|
Prerequisites
|
unspecified
|
Assessment methods and criteria
|
Oral examination
The student is lead to self-reliant work, when knowledge obtaining by his/her study is able to implant into his/her thesis. The problems solving by methods included within this subject are presented by student's self-reliant work. The student is able to defend his/her conclusions in the scientific discussion and implement it into his/her thesis.
|
Recommended literature
|
-
Bacard, A. Computer Privacy Handbook. 1995.
-
Bishop, Matt. Introduction to computer security. Boston: Addison-Wesley, 2005. ISBN 0-321-24744-2.
-
Hunter,J., H., D. Information Security Handbook. Spriongler Verlag, 2001. ISBN 1-85233-180-1.
-
Leixner,M. PC zálohování a archivace dat. Grada, 1993.
-
Menezes A. J., Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography. http://www.math.uwaterloo.ca/hac. CRC Press, 2001.
-
Schneier, B. Applied Cryptography, Protocols, Algorithms and source code in C.. John Wiley, 1996. ISBN 0-471-11709-9.
-
Stallings, William. Cryptography and network security : principles and practice. Upper Saddle River: Pearson Education, 2003. ISBN 0-13-111502-2.
-
Zelenka J., Čapek J., Francek J., Janáková H. Ochrana dat. Kryptologie.. Gaudeamus, Hradec Králové, 2003.
|