Course detail
Information system security
FEKT-MBISAcad. year: 2012/2013
Modern civilization depends on a correct functioning of information systems. Significant attention must therefore be paid to the security of these systems. On completing the course, students will have a thorough overview in possible methods of securing an information system. Lectures are mainly dedicated to explaining the functioning of cryptography protections, communication protections, access control techniques, and computer protections. Exercises are computational ones and are dedicated to strengthening the theoretical knowledge and to considering quantitatively the different types of protection.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
• to explain the principles of the symmetric cryptosystems,
• to explain the principles of the asymmetric cryptosystems,
• to explain the principles of the functioning of communication protections,
• to explain the principles of the functioning of access control systems,
• to explain the principles of the functioning of computer protections,
• to explain the principles of emission protections,
• to explain the principles of security evaluation.
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
1. Basic terms.
2. Symmetric cryptosystems.
3. Asymmetric cryptosystems.
4. Protocols for secure communication.
5. Codes for error detection and correction.
6. Protection of communication channels.
7. Filtering methods and intrusion detection systems.
8. Access control.
9. Computer security.
10. Emission security.
11. Information security evaluation.
12. Physical security.
13. Prospective evolutionary trends.
Computational exercises:
1. Introduction to cryptography.
2. Examples of symmetric cryptosystems.
3. Examples of asymmetric cryptosystems.
4. Examples of protocols for secure communication.
5. Examples of codes for error detection and correction.
6. Examples of communication channel protections.
7. Examples of filtering methods and intrusion detection system.
8. Examples of access control systems.
9. Examples of computer protections.
10. Examples of emission security techniques.
11. Methods of information security evaluation.
12. Designing physical security.
13. Credit exercise.
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
Recommended reading
Classification of course in study plans
- Programme EEKR-M Master's
branch M-TIT , 1 year of study, winter semester, elective specialised
branch M-KAM , 2 year of study, winter semester, elective interdisciplinary - Programme EEKR-M Master's
branch M-TIT , 1 year of study, winter semester, elective specialised
branch M-KAM , 2 year of study, winter semester, elective interdisciplinary - Programme EEKR-CZV lifelong learning
branch EE-FLE , 1 year of study, winter semester, elective specialised
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
2. Symmetric cryptosystems.
3. Asymmetric cryptosystems.
4. Secure communications protocols.
5. Emission security.
6. Error codes.
7. Protections of communications channels.
8. Filtering methods, intrusion detection systems.
9. Access control methods.
10. Computer security.
11. Physical protections.
12. Security management in information systems.
13. Security evaluations of information systems.
Fundamentals seminar
Teacher / Lecturer
Syllabus
2. Applications of symmetric cryptography.
3. Applications of asymmetric cryptography.
4. Applications of secure communication protocols.
5. Applications of emission security.
6. Applications of error codes.
7. Applications of spread spectrum methods.
8. Applications of communications controls.
9. Applications of access methods.
10. Applications of software protections.
11. Physical security in practice.
12. Risk management in practice.
13. Applications of ISO 15408.