Course Unit Code | 050-0510/03 |
---|
Number of ECTS Credits Allocated | 5 ECTS credits |
---|
Type of Course Unit * | Choice-compulsory |
---|
Level of Course Unit * | First Cycle |
---|
Year of Study * | Fourth Year |
---|
Semester when the Course Unit is delivered | Winter Semester |
---|
Mode of Delivery | Face-to-face |
---|
Language of Instruction | Czech |
---|
Prerequisites and Co-Requisites | Course succeeds to compulsory courses of previous semester |
---|
Name of Lecturer(s) | Personal ID | Name |
---|
| SEN76 | doc. Ing. Pavel Šenovský, Ph.D. |
Summary |
---|
Problematics of data protection in time of extensive usage of complex information systems cased to be a problem of the IT personnel, but needs to be addressed by much broader community of experts with varied specialization, including experts in general safety and security. During the course the students will learn about the most common techniques of system penetration and protection against it, including the basics of development of the IT security policies, compatible with ISO 27000 norms. The course is intended for future safety and security experts (non IT), to allow for effective communication with IT experts when coordinating safety and security measures between these professions, while protecting organization’s interests. |
Learning Outcomes of the Course Unit |
---|
The goal of the subject is to understand the work with the computer networks and methods of their protection. And further also to get the basic knowledge of the database systems. |
Course Contents |
---|
1. Introduction to the course
2-3. Services of modern computer networks
4. Information security management system (ISMS)
5. Use case of ISMS
6. Identity management in computer network
7. Authentication and authorization methods
8. Techniques used by malware
9. backup, disc cloning and RAID
10. Network perimeter and its protection
11. Human factor
12-13. Attack vectors |
Recommended or Required Reading |
---|
Required Reading: |
---|
Gollman, D. Computer Security. 3rd ed. Wiley, 2011, 456 pp., ISBN 978-0470741153. |
Šenovský, P. Počítačové sítě a ochrana dat. Ostrava: VŠB - Technická univerzita Ostrava, 2015, 88 s.
Gollman, D. Computer Security. 3rd ed. Wiley, 2011, 456 pp., ISBN 978-0470741153. |
Recommended Reading: |
---|
Stallings, W., Brown, L. Computer Security: Principles and Practice. 2nd ed. Prentice Hall, 2011, 816 pp. ISBN 978-0132775069. |
Doseděl, T. Počítačová bezpečnost a ochrana dat. Computer Press, Brno 2004,182 str., ISBN 80-251-0106-1. |
Planned learning activities and teaching methods |
---|
Lectures, Tutorials |
Assesment methods and criteria |
---|
Task Title | Task Type | Maximum Number of Points (Act. for Subtasks) | Minimum Number of Points for Task Passing |
---|
Credit and Examination | Credit and Examination | 100 (100) | 51 |
Credit | Credit | 45 | 16 |
Examination | Examination | 55 | 28 |