Course: Data Security and Protection

« Back
Course title Data Security and Protection
Course code USII/KBOI
Organizational form of instruction Lecture
Level of course Master
Year of study 2
Semester Winter and summer
Number of ECTS credits 5
Language of instruction Czech
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Čapek Jan, prof. Ing. CSc.
Course content
Introduction to cryptology. Shannon coding. Symmetric and asymmetric encrypt and decrypt methods. The Vernam and Hill encrypt and decrypt methods. Public and non-public keys. Elliptic curves. Certificated authorities. Secure data transfer. Coding. Models of security systems. Data security in networks. Firewalls. Stenography.

Learning activities and teaching methods
Monologic (reading, lecture, briefing), Dialogic (discussion, interview, brainstorming), Skills training
Learning outcomes
The subject is aimed at the security of information during their data processing and data transfers. The importance of security of information will be touched (Organizational technique including cryptography).
Student will be able to apply security measurements to protect data and information technologies in practice of selected kinds of economic subjects. Student will be able to choose adequate security measurements for given situation.
Prerequisites
unspecified

Assessment methods and criteria
Oral examination, Written examination, Home assignment evaluation

The assignment is granted upon passing the final test, and presentation of the seminar paper. The examination is oral and verifies gained knowledge of presented themes.
Recommended literature
  • Bacard, A. Computer Privacy Handbook. 1995.
  • Bishop, Matt. Introduction to computer security. Boston: Addison-Wesley, 2005. ISBN 0-321-24744-2.
  • Hunter,J., H., D. Information Security Handbook. Spriongler Verlag, 2001. ISBN 1-85233-180-1.
  • Leixner,M. PC zálohování a archivace dat. Grada, 1993.
  • Menezes A. J., Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography. http://www.math.uwaterloo.ca/hac. CRC Press, 2001.
  • Schneier, B. Applied Cryptography, Protocols, Algorithms and source code in C. John Wiley, 1996. ISBN 0-471-11709-9.
  • Stallings, William. Cryptography and network security : principles and practice. Upper Saddle River: Pearson Education, 2003. ISBN 0-13-111502-2.
  • Zelenka J., Čapek J., Francek J., Janáková H. Ochrana dat. Kryptologie.. Gaudeamus, Hradec Králové, 2003.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester
Faculty: Faculty of Economics and Administration Study plan (Version): Regional and Information Management (2014) Category: Economy 2 Recommended year of study:2, Recommended semester: Winter
Faculty: Faculty of Economics and Administration Study plan (Version): Informatics in Public Administration (2013) Category: Economy 2 Recommended year of study:2, Recommended semester: Winter
Faculty: Faculty of Economics and Administration Study plan (Version): Regional and Information Management (2013) Category: Economy 2 Recommended year of study:2, Recommended semester: Winter
Faculty: Faculty of Economics and Administration Study plan (Version): Informatics in Public Administration (2014) Category: Economy 2 Recommended year of study:2, Recommended semester: Winter