Course detail
Management Information Security
FP-ImibeKAcad. year: 2024/2025
Information Security Management is focused on the security aspects of information systems and to explore the basic elements of creating security policies of the organization. It is to introduce students to the main areas and directions of the implementation of security measures and to acquaint them with their policies.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Entry knowledge
Rules for evaluation and completion of the course
Oral examination.
Aims
Emphasis is also placed on gaining knowledge of current methodologies of information security management in enterprise IS, especially according to the ČSN ISO/IEC 27001 standard.
Study aids
Prerequisites and corequisites
Basic literature
ČSN EN ISO/IEC 27002:2023 Informační bezpečnost, kybernetická bezpečnost a ochrana soukromí – Opatření informační bezpečnosti (CS)
ČSN ISO/IEC 27000:2017 Informační technologie – Bezpečnostní techniky – Systémy řízení bezpečnosti informací – Přehled a slovník (CS)
SEDLÁK, P. a KONEČNÝ, M.: Přeměna ISMS v manažerské informatice. Brno. CERM. 2023. ISBN 978-80-7623-110-8. (CS)
Recommended reading
SMEJKAL, V. Kybernetická kriminalita. 2. vydání. Plzeň: Nakladatelství Aleš Čeněk, 2018. 936 str., ISBN 978-80-7380-720-7. (CS)
Classification of course in study plans
- Programme MGR-IM-KS Master's 1 year of study, winter semester, compulsory
Type of course unit
Guided consultation in combined form of studies
Teacher / Lecturer
Syllabus
The aim of the course is a basic understanding of information security management (ISMS) in the complex concept of organizational management.
A follow-up objective is to understand the linkages in security issues from the individual to the organization.
Another objective is to introduce students to the main areas and directions in the implementation of security measures and to familiarize them with their principles.
1. Digital literacy
2. Basic concepts of information security management
3. Definition of information security management
4. Methodology of ISMS implementation
5. Security risk analysis
6. Security measures
7. Security standards
8. Network security management
9. Application security management
10. Supply chain security
11. Data protection management
12. Personal security and physical IT security issues.
13. Cybersecurity Act and implementing regulations.