Skip to main content
Skip header

Security Informatics

* Exchange students do not have to consider this information when selecting suitable courses for an exchange stay.

Course Unit Code050-0527/02
Number of ECTS Credits Allocated4 ECTS credits
Type of Course Unit *Optional
Level of Course Unit *First Cycle
Year of Study *Second Year
Semester when the Course Unit is deliveredSummer Semester
Mode of DeliveryFace-to-face
Language of InstructionCzech
Prerequisites and Co-Requisites Course succeeds to compulsory courses of previous semester
Name of Lecturer(s)Personal IDName
SEN76doc. Ing. Pavel Šenovský, Ph.D.
Summary
Information and informative technology are force of modern society. Its possibly to the meet students with basic conception of the theory information generally and with practical works application of modern informative technology. The students meet the regulation of copyright law, mainly its for spreading programs and other author works in the electronic form.
Learning Outcomes of the Course Unit
The goal of the subject is to give basic knowledge about:
- theory to information,
- cipher,
- electronic signature,
- telecommunication legal.
Course Contents
1. Introduction
2. Introduction to theory of information
3. Software
4. Malware and methods of protection against it
5. Encryption – history, symmetrical encryption
6. Asymmetric methods of encryption and electronic signature
7. Electronic signature – legislative view
8. Introduction to computer networks
9. E-government
10. Information systems of public administration
11. Cybernetic security of Czech republic
12. Telecomunications – legislative view
13. IT Trends
Recommended or Required Reading
Required Reading:
ŠENOVSKÝ, Pavel. Security informatics 1 [online]. 9. vydání, Ostrava: VŠB-TU Ostrava, 2020, 158 s., Dostupné z https://fbiweb.vsb.cz/~sen76/data/uploads/skripta/bi1_9ed.pdf [cit. 2020-02-27]
Šenovský, P. Bezpečnostní informatika 1 [online]. 8. vydání, Ostrava: VŠB-TU Ostrava, 2017, 127 s., Dostupné z https://fbiweb.vsb.cz/~sen76/data/uploads/skripta/bi1_8ed_fin.pdf [cit. 2017-03-03]
Šenovský, P. Bezpečnostní informatika 1 - Návody do cvičení[online]. Ostrava: VŠB-TU Ostrava, 2017, 68 s., Dostupné z https://fbiweb.vsb.cz/~sen76/data/uploads/skripta/bi1_navody_fin.pdf [cit. 2017-01-16]
Recommended Reading:
Singh, S. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor, 2000, 432 pp. ISBN 978-0385495325
Mason, S. Electronic Signatures in Law. 3rd ed. Cambridge University Press, 2012, 408 pp. ISBN 978-1107012295
REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL (EU) 910/2014 of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC
Singh, S. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor, 2000, 432 pp. ISBN 978-0385495325.
Mason, S. Electronic Signatures in Law. 3rd ed. Cambridge University Press, 2012, 408 pp. ISBN 978-1107012295.
Zákon č. 297/2016 Sb., o službách vytvářejících důvěru pro elektronické transakce.
Zákon č. 110/2019 Sb., o zpracování osobních údajů
Zákon č. 365/2000 Sb., o informačních systémech veřejné správy.
Zákon č. 300/2008 Sb., o elektronických úkonech a autorizované konverzi dokumentů.
Zákon č. 181/2014 Sb., o kybernetické bezpečnosti a o změně souvisejících zákonů (zákon o kybernetické bezpečnosti)
Planned learning activities and teaching methods
Lectures, Tutorials
Assesment methods and criteria
Task TitleTask TypeMaximum Number of Points
(Act. for Subtasks)
Minimum Number of Points for Task Passing
Credit and ExaminationCredit and Examination100 (100)51
        CreditCredit45 23
        ExaminationExamination55 28