Course: Data Security and Protection

« Back
Course title Data Security and Protection
Course code USII/ABOI
Organizational form of instruction Lecture + Tutorial
Level of course Master
Year of study 2
Semester Winter
Number of ECTS credits 5
Language of instruction English
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Course availability The course is available to visiting students
Lecturer(s)
  • Hub Miloslav, doc. Ing. Ph.D.
  • Čapek Jan, prof. Ing. CSc.
Course content
Introduction to cryptology. Shannon coding. Symmetric and asymmetric encrypt and decrypt methods. The Vernam and Hill encrypt and decrypt methods. Public and non-public keys. Elliptic curves. Certificated authorities. Secure data transfer. Coding. Models of security systems. Data security in networks. Firewalls. Stenography.

Learning activities and teaching methods
Monologic (reading, lecture, briefing)
Learning outcomes
The subject is aimed at the security of information during their data processing and data transfers. The importance of security of information will be touched (Organizational technique including cryptography).
Student will be able to apply security measurements to protect data and information technologies in practice of selected kinds of economic subjects. Student will be able to choose adequate security measurements for given situation.
Prerequisites
unspecified

Assessment methods and criteria
Oral examination

Assignment: active attendance at seminars, presentation of the seminar work with the topic "Protection of the selected company". Exam: oral.
Recommended literature
  • Bishop, Matt. Introduction to computer security. Boston: Addison-Wesley, 2005. ISBN 0-321-24744-2.
  • Caeli, W., Longley, D., Shain, M. Information Security Handbook.. MacMillan, 1994.
  • Hankerson, Darrel. Coding theory and cryptography : the essentials. New York: Marcel Dekker, 2000. ISBN 0-8247-0465-7.
  • Menezes A. J., Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography. http://www.math.uwaterloo.ca/hac. CRC Press, 2001.
  • Schneier, B. Applied Cryptography, Protocols, Algorithms and source code in C.. John Wiley, 1996. ISBN 0-471-11709-9.
  • Stallings, William. Cryptography and network security : principles and practice. Upper Saddle River: Pearson Education, 2003. ISBN 0-13-111502-2.
  • Stinson, Douglas Robert. Cryptography : theory and practice. Boca Raton: Chapman & Hall, 2002. ISBN 1-58488-206-9.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester
Faculty: Faculty of Economics and Administration Study plan (Version): Regional and Information Management (2013) Category: Economy 2 Recommended year of study:2, Recommended semester: Winter