|
Lecturer(s)
|
-
Brandejský Tomáš, doc. Ing. Dr.
|
|
Course content
|
1. Examples of sensitive data, data whose protection is requires by actual law, open and closed information system 2. Coding and encripting, history of cryptography, simple codes 3. Relations and projections 4. Groups 5. Rings, fields 6. Linear and cyclic codes 7. Lattices, Boole algebras 8. Integer factorization, Primality test, prime numbers generating 9. Public key cryptography 10. key administration, cryptocurrencies 11. Security problems of shared resources, virtualization 12. Data center design 13. Legislative, personal data protection, GDPR
|
|
Learning activities and teaching methods
|
Monologic (reading, lecture, briefing), Methods of individual activities, Skills training
- Term paper
- 45 hours per semester
- Contact teaching
- 52 hours per semester
- Home preparation for classes
- 20 hours per semester
- Preparation for an exam
- 33 hours per semester
|
|
Learning outcomes
|
The aim of the subject is to introduce students into advanced methods of information system design with respect to data security respecting related standards and actual legislative.
Absolvent will be able to evaluate risks and methods of information system protection. He/She will know basics of cryptography, coding and encryphering. He/She/It will be able to evaluate risks and adequacy of information resources securing as well as open and close communication systems.
|
|
Prerequisites
|
Knowledge of data structures, programming, basic information system structure and algebra on the level of introductory mathematics course of engineering study.
|
|
Assessment methods and criteria
|
Oral examination, Student performance assessment
|
|
Recommended literature
|
-
BURDA, Karel. Úvod do kryptografie. Brno, 2015. ISBN 978-80-7204-925-7.
|