Přístupnostní navigace
E-application
Search Search Close
Course detail
FEKT-MKC-BKSAcad. year: 2024/2025
Modern civilization depends on a correct functioning of information systems. Significant attention must therefore be paid to the security of these systems. On completing the course, students will have a thorough overview of possible methods of securing an information system. Lectures are mainly dedicated to explaining the functioning of cryptography protections, communication protections, access control techniques, and computer protections. Exercises are computational ones and are dedicated to strengthening the theoretical knowledge and to considering quantitatively the different types of protection.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Entry knowledge
Rules for evaluation and completion of the course
Aims
Study aids
Prerequisites and corequisites
Basic literature
Recommended reading
Elearning
Classification of course in study plans
Lecture
Teacher / Lecturer
Syllabus
1. Basics of cryptography2. Symmetric cryptosystems3. Asymmetric cryptosystems4. Secure communication protocols5. Error detection and correction codes6. Protection of communication channels7. Communication hiding and anonymisation8. Access control9. Data backup10. Computer security11. Compromise and parasitic channels12. Security management and evaluations13. Reserve
Fundamentals seminar
1. Application of secrecy theory2. Operation of symmetric cryptography3. Operation of asymmetric cryptography4. Application of secure communication protocols5. Application of error detection and correction codes6. Application of signal spread spectrum methods7. Application of communication hiding mechanisms8. Application of access control mechanisms9. Application of data backup theory10. Application of SW and OS protection mechanisms11. Application of emission protection12. Application of risk analysis and management methods13. Reserve