|
|
Main menu for Browse IS/STAG
Course info
FES / ETZI
:
Course description
Department/Unit / Abbreviation
|
FES
/
ETZI
|
Academic Year
|
2023/2024
|
Academic Year
|
2023/2024
|
Title
|
Theory of Information and Data Security
|
Form of course completion
|
Examination
|
Form of course completion
|
Examination
|
Accredited / Credits
|
Yes,
10
Cred.
|
Type of completion
|
Combined
|
Type of completion
|
Combined
|
Time requirements
|
Lecture
4
[Hours/Semester]
Seminar
8
[Hours/Semester]
|
Course credit prior to examination
|
No
|
Course credit prior to examination
|
No
|
Automatic acceptance of credit before examination
|
No
|
Included in study average
|
NO
|
Language of instruction
|
English
|
Occ/max
|
|
|
|
Automatic acceptance of credit before examination
|
No
|
Summer semester
|
0 / -
|
3 / -
|
0 / -
|
Included in study average
|
NO
|
Winter semester
|
0 / -
|
0 / -
|
0 / -
|
Repeated registration
|
NO
|
Repeated registration
|
NO
|
Timetable
|
Yes
|
Semester taught
|
Winter + Summer
|
Semester taught
|
Winter + Summer
|
Minimum (B + C) students
|
not determined
|
Optional course |
Yes
|
Optional course
|
Yes
|
Language of instruction
|
English
|
Internship duration
|
0
|
No. of hours of on-premise lessons |
|
Evaluation scale |
S|N |
Periodicity |
každý rok
|
Periodicita upřesnění |
|
Fundamental theoretical course |
Yes
|
Fundamental course |
No
|
Fundamental theoretical course |
Yes
|
Evaluation scale |
S|N |
Substituted course
|
None
|
Preclusive courses
|
N/A
|
Prerequisite courses
|
N/A
|
Informally recommended courses
|
N/A
|
Courses depending on this Course
|
N/A
|
Histogram of students' grades over the years:
Graphic PNG
,
XLS
|
Course objectives:
|
The aim of this course is learn theoretical knowledge about data security, secure data transfer and processing, focus on the organisational precaution include encryption.
|
Requirements on student
|
The student is lead to self-reliant work, when knowledge obtaining by his/her study is able to implant into his/her thesis. The problems solving by methods included within this subject are presented by student's self-reliant work. The student is able to defend his/her conclusions in the scientific discussion and implement it into his/her thesis.
|
Content
|
Introduction to cryptology, Shannon's theory of encryption, Vernam's and Hill's cipher. Symmetric and asymmetric ciphers- methods, advantages and disadvantages, modern methods approach. Elliptic curves, Certification authority and protocols. Secure data transmission, Coding, Safe systems models, Data safety in networks, Steganography, Watermarking.
|
Activities
|
|
Fields of study
|
|
Guarantors and lecturers
|
-
Guarantors:
doc. Ing. Miloslav Hub, Ph.D. ,
-
Lecturer:
prof. Ing. Jan Čapek, CSc. (50%),
doc. Ing. Miloslav Hub, Ph.D. (50%),
-
Seminar lecturer:
prof. Ing. Jan Čapek, CSc. (50%),
doc. Ing. Miloslav Hub, Ph.D. (50%),
|
Literature
|
-
Basic:
Schneier, B. Applied Cryptography, Protocols, Algorithms and source code in C.. John Wiley, 1996. ISBN 0-471-11709-9.
-
Basic:
Stallings, William. Cryptography and network security : principles and practice. Upper Saddle River: Pearson Education, 2003. ISBN 0-13-111502-2.
-
Basic:
Hunter,J., H., D. Information Security Handbook. Spriongler Verlag, 2001. ISBN 1-85233-180-1.
-
Basic:
Bishop, Matt. Introduction to computer security. Boston: Addison-Wesley, 2005. ISBN 0-321-24744-2.
-
Further literature:
Zelenka J., Čapek J., Francek J., Janáková H. Ochrana dat. Kryptologie.. Gaudeamus, Hradec Králové, 2003.
-
Recommended:
Bacard, A. Computer Privacy Handbook. 1995.
-
Recommended:
Menezes A. J., Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography. http://www.math.uwaterloo.ca/hac. CRC Press, 2001.
-
Recommended:
Leixner,M. PC zálohování a archivace dat. Grada, 1993.
|
Prerequisites - other information about course preconditions |
- |
Competences acquired |
The student will be able to apply data security and information protection methods in praxis of the specific economic subjects, he/she will be able to chose suitable methods of information protection within the chosen subject.
|
Teaching methods |
- Dialogic (discussion, interview, brainstorming)
|
Assessment methods |
|
|
|
|