Lecturer(s)
|
|
Course content
|
Operational equipment. Technologies for obtaining sensitive information. Technical design of bugging devices. Protection against sensitive information theft - organisational procedures, company security strategies and checking compliance with them. Preventive technical check ups. Technical procedures against operational equipment set up.
|
Learning activities and teaching methods
|
Monologic (reading, lecture, briefing), Work with text (with textbook, with book), Methods of individual activities
|
Learning outcomes
|
As future managers in the security industry and their own security departments of business subjects, the aim of the course is to acquaint the students with the possibilities of the misuse of competitive intelligence by the competition, as well as the possible protection against such equipment (special security).
Students will become familiar with the basic technology used in the area of special security equipment. They will be able to propose suitable organisational procedures, security strategies and to manage the compliance with them within the organisation.
|
Prerequisites
|
unspecified
|
Assessment methods and criteria
|
Oral examination, Written examination, Home assignment evaluation
Assignment: written test (at minimum 60 %) and successful defence of a practical project. Student is supposed to prove ability of application of theoretical knowledge in project elaboration. Detailed information will be provided during the first lecture and in Stag.
|
Recommended literature
|
-
Brabec,F. a kol. Bezpečnost pro firmu, úřad, občana. Praha -Public History, 2001. ISBN 80-86445-04-0.
-
Jirovský, V. Kybernetická kriminalita. 2007. ISBN 80-247-1561-9.
-
Rais, K. Řízení rizik ve firmách a jiných organizacích. 2006. ISBN 80-247-1667-4.
|