Course detail

Information System Security

FIT-BISAcad. year: 2020/2021

The course aims to the security goals, security functions, and security mechanisms. The content is: Introduction into information security, basic terms, threats, weak points, security measures, criteria for system security assessment, Common Criteria, data transmission security, operating system and database security, malicious software,  role of cryptography.

Language of instruction

Czech

Number of ECTS credits

5

Mode of study

Not applicable.

Learning outcomes of the course unit

Students will learn basic principles of information systems security. They will learn also terminology, basic security goals, functions, and mechanisms.

Prerequisites

Not applicable.

Co-requisites

Not applicable.

Planned learning activities and teaching methods

Not applicable.

Assesment methods and criteria linked to learning outcomes

A mid-term exam evaluation and an evaluation of projects.
Exam prerequisites:
To obtain at least one point in each project.

Course curriculum

Not applicable.

Work placements

Not applicable.

Aims

The goal is to make students familiar with the basic concepts of information systems security.

Specification of controlled education, way of implementation and compensation for absences

Not applicable.

Recommended optional programme components

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0

Recommended reading

Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
Stallings, W.: Cryptography and Network Security, Pearson India, 2018, ISBN 9789332585225

Classification of course in study plans

  • Programme IT-MSC-2 Master's

    branch MGM , 0 year of study, winter semester, elective
    branch MBI , 0 year of study, winter semester, compulsory-optional
    branch MBS , 0 year of study, winter semester, compulsory
    branch MIN , 0 year of study, winter semester, compulsory-optional
    branch MIS , 0 year of study, winter semester, compulsory
    branch MMI , 0 year of study, winter semester, elective
    branch MMM , 0 year of study, winter semester, compulsory-optional
    branch MPV , 0 year of study, winter semester, compulsory-optional
    branch MSK , 2 year of study, winter semester, compulsory

  • Programme MITAI Master's

    specialization NISY , 0 year of study, winter semester, elective
    specialization NADE , 0 year of study, winter semester, elective
    specialization NBIO , 0 year of study, winter semester, elective
    specialization NCPS , 0 year of study, winter semester, compulsory
    specialization NEMB , 0 year of study, winter semester, elective
    specialization NHPC , 0 year of study, winter semester, elective
    specialization NGRI , 0 year of study, winter semester, elective
    specialization NIDE , 0 year of study, winter semester, elective
    specialization NISD , 2 year of study, winter semester, compulsory
    specialization NMAL , 0 year of study, winter semester, elective
    specialization NMAT , 0 year of study, winter semester, elective
    specialization NNET , 0 year of study, winter semester, elective
    specialization NSEC , 0 year of study, winter semester, compulsory
    specialization NSEN , 0 year of study, winter semester, compulsory
    specialization NSPE , 0 year of study, winter semester, elective
    specialization NVER , 0 year of study, winter semester, compulsory
    specialization NVIZ , 0 year of study, winter semester, elective

Type of course unit

 

Lecture

39 hod., optionally

Teacher / Lecturer

Syllabus

  • Introduction
  • Threats, vulnerabilities
  • Security measures
  • Criteria for system security assessment
  • Common criteria (CC)
  • Security functions
  • Risk analysis
  • Data transmission security
  • Operating system security
  • Database security
  • Web security
  • Smart card applications
  • Role of cryptography

Project

13 hod., compulsory

Teacher / Lecturer

Syllabus

  1. A homework on security mechanisms.
  2. A homework on applied cryptography.