Course: Data Security and Protection

« Back
Course title Data Security and Protection
Course code USII/PBOI
Organizational form of instruction Lecture + Tutorial
Level of course Master
Year of study 2
Semester Winter
Number of ECTS credits 5
Language of instruction Czech
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Kopáčková Hana, doc. Ing. Ph.D.
  • Čapek Jan, prof. Ing. CSc.
  • Hub Miloslav, doc. Ing. Ph.D.
  • Tomeš Milan, Ing.
Course content
Introduction to cryptology. Shannon coding. Symmetric and asymmetric encrypt and decrypt methods. The Vernam and Hill encrypt and decrypt methods. Public and non-public keys. Elliptic curves. Certificated authorities. Secure data transfer. Coding. Models of security systems. Data security in networks. Firewalls. Stenography.

Learning activities and teaching methods
Monologic (reading, lecture, briefing), Dialogic (discussion, interview, brainstorming), Skills training
Learning outcomes
The aim of the course is to master theoretical knowledge about the information security upon its processing by the means of computer technology and its transfers. Furthermore, the course is designed to help students to understand diverse proceedings ranging from the organizational to technical ones, including coding.
Students will be able to apply methods of data security and protection in the practice of specific economic subjects as well as to choose the appropriate methods of data security and protection in the particular subject.
Prerequisites
unspecified

Assessment methods and criteria
Oral examination, Written examination, Home assignment evaluation

The assignment is granted upon completion of the following conditions: active attendance at seminars, passing the final test, presentation of the seminar paper on a firm security. The examination is oral and verifies gained knowledge of presented themes.
Recommended literature
  • Bishop, Matt. Introduction to computer security. Boston: Addison-Wesley, 2005. ISBN 0-321-24744-2.
  • Leixner, M. PC zálohování a archivace dat.. GRADA, 1993.
  • Menezes A. J., Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography. http://www.math.uwaterloo.ca/hac. CRC Press, 2001.
  • Schneier, B. Applied Cryptography, Protocols, Algorithms and source code in C.. John Wiley, 1996. ISBN 0-471-11709-9.
  • Stallings, William. Cryptography and network security : principles and practice. Upper Saddle River: Pearson Education, 2003. ISBN 0-13-111502-2.
  • Stinson, Douglas Robert. Cryptography : theory and practice. Boca Raton: Chapman & Hall, 2002. ISBN 1-58488-206-9.
  • Zelenka J., Čapek J., Francek J., Janáková H. Ochrana dat. Kryptologie.. Gaudeamus, Hradec Králové, 2003.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester
Faculty: Faculty of Economics and Administration Study plan (Version): Regional and Information Management (2013) Category: Economy 2 Recommended year of study:2, Recommended semester: Winter
Faculty: Faculty of Economics and Administration Study plan (Version): Regional Development (2014) Category: Economy 2 Recommended year of study:2, Recommended semester: Winter
Faculty: Faculty of Economics and Administration Study plan (Version): Informatics in Public Administration (2014) Category: Economy 2 Recommended year of study:2, Recommended semester: Winter
Faculty: Faculty of Economics and Administration Study plan (Version): Regional and Information Management (2014) Category: Economy 2 Recommended year of study:2, Recommended semester: Winter
Faculty: Faculty of Economics and Administration Study plan (Version): Informatics in Public Administration (2013) Category: Economy 2 Recommended year of study:2, Recommended semester: Winter
Faculty: Faculty of Economics and Administration Study plan (Version): Insurance Engineering (2013) Category: Economy 1 Recommended year of study:1, Recommended semester: Winter
Faculty: Faculty of Economics and Administration Study plan (Version): Regional Development (2013) Category: Economy 2 Recommended year of study:2, Recommended semester: Winter