Course detail

Users Security Systems

FP-IBUZAcad. year: 2014/2015

The course gives basic information about the user's safety during the ICT usage. Students will gain knowledge and skills in the field of security, focusing on E-mail, Internet, social networks, including legal system and legislative changes.

Language of instruction

Czech

Mode of study

Not applicable.

Learning outcomes of the course unit

Students will gain skills of safe practices with network resources, will be able to identify potential common attack on their PC and prevent it. They will have knowledge with good password management, publishing their sensitive data in email and on social networks including legal aspects of downloading content from Internet

Prerequisites

Knowledge from the previous studies.

Co-requisites

Not applicable.

Planned learning activities and teaching methods

Lectures consist of an explanation of basic principles, methodology of the discipline, problems and their solutions.

Assesment methods and criteria linked to learning outcomes

The course is completed by a course-credit, which is awarded according to attendance. Student may be missing on up to 3 lectures.

Course curriculum

Introduction to users security systems
Cybercrime
Malicious codes
Spam and e-mail
Risk related to electronic identity
Web threats
Social Networks
Industrial espionage
Organizational security
Law and Legislation
Technical means of protection
The future attacks and information security

Work placements

Not applicable.

Aims

The aim of the course is to explain the basic principles of user safety during working with ICT, including behavior on social networks and Internet.

Specification of controlled education, way of implementation and compensation for absences

Attendance at seminars is controlled.

Recommended optional programme components

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

Doseděl, T.: Počítačová bezpečnost a ochrana dat. Grada, Praha 2004 (CS)
Přibyl, T. Počítačové viry v roce 2004, IDG, 2003 (CS)

Recommended reading

Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999 (EN)

Classification of course in study plans

  • Programme BAK Bachelor's

    branch BAK-EPM , 1 year of study, winter semester, elective (voluntary)
    branch BAK-MTK , 1 year of study, winter semester, elective (voluntary)
    branch BAK-EP , 1 year of study, winter semester, elective (voluntary)
    branch BAK-UAD , 1 year of study, winter semester, elective (voluntary)

  • Programme BAK-KME Bachelor's

    branch BAK-MME , 1 year of study, winter semester, elective (voluntary)

  • Programme BAK-MIn Bachelor's

    branch BAK-MIn , 1 year of study, winter semester, elective (voluntary)

  • Programme MGR Master's

    branch MGR-ŘEP , 1 year of study, winter semester, elective (voluntary)
    branch MGR-PFO , 1 year of study, winter semester, elective (voluntary)
    branch MGR-UFRP , 1 year of study, winter semester, elective (voluntary)

  • Programme MGR-SI Master's

    branch MGR-IM , 1 year of study, winter semester, elective (voluntary)

Type of course unit

 

Exercise

26 hod., compulsory

Teacher / Lecturer

Syllabus

Úvod do problematiky IB
Kyberzločin
Škodlivé kódy
Spam a elektronická pošta
Nebezpečí související s elektronickou identitou
Webové hrozby
Sociální sítě
Průmyslová špionáž
Organizační bezpečnost
Právo a legislativa
Technické prostředky ochrany
Budoucnost útoků a informační bezpečnosti