Course: Introduction to Information Security and Protection

« Back
Course title Introduction to Information Security and Protection
Course code USII/EUBOI
Organizational form of instruction Lecture + Tutorial
Level of course Bachelor
Year of study 3
Semester Winter
Number of ECTS credits 5
Language of instruction English
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Hub Miloslav, doc. Ing. Ph.D.
Course content
Security features and security mechanisms. Authentication. Authorization. Viruses, malicious code. Social engineering. Cryptology. Electronic signature and public key infrastructure. Act on Archiving and Records Service. Risk analysis. Security policy. Business Process Continuity Plan. Disaster Recovery Plan. Physical security.

Learning activities and teaching methods
Monologic (reading, lecture, briefing), Dialogic (discussion, interview, brainstorming), Demonstration
  • Individual project - 41 hours per semester
  • Contact teaching - 39 hours per semester
  • Preparation for an exam - 50 hours per semester
  • Data/material collection - 20 hours per semester
Learning outcomes
The aim of the course is to acquire knowledge of basic terminology and basic issues in the field of security and information protection with an emphasis on the ability to use acquired knowledge in solving specific tasks.
A student who has successfully completed the course can: describe the basic objectives of information security; classify security mechanisms into categories; classify encryption algorithms into individual categories; explain the meaning and principle of electronic signature; describe the selection and registration of archival materials, the protection of archival materials, the rights and obligations of archive holders, the rights and obligations of holders and administrators of archival materials, the use of archival materials, the processing of personal data for archival purposes, describe the system of archives, the rights and obligations of archival founders; explain the importance of risk analysis and describe its progress; explain the importance of security policy and describe its types. A student who has successfully completed the course can: make appropriate use of cryptographic tools; use the electronic signature appropriately; be familiar with the Act on Archiving and Records Management; carry out an indicative risk analysis; implement the firm's security policy. The student who has successfully completed the course is able to: to include a consideration of their legal dimension in problem solving; to communicate in a clear and convincing way to professionals and lay people information on the nature of professional issues and their own opinion on their solution.
Prerequisites
unspecified

Assessment methods and criteria
Home assignment evaluation, Didactic test, Systematic monitoring

Assigment: participation in exercises (see guidelines), elaboration of assigned tasks for exercises. Exam: electronic test with at least 70% success rate. Requirements will be specified in the first exercise.
Recommended literature
  • Stewart J. M.,Tittel E., Chapple M. CISSP - Certified Information Systems Security Professional Study Guide. Sybex, 2011. ISBN 978-0470944981.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester