Course detail
Users Security Systems
FP-IBUZAcad. year: 2014/2015
The course gives basic information about the user's safety during the ICT usage. Students will gain knowledge and skills in the field of security, focusing on E-mail, Internet, social networks, including legal system and legislative changes.
Language of instruction
Mode of study
Guarantor
Learning outcomes of the course unit
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
Cybercrime
Malicious codes
Spam and e-mail
Risk related to electronic identity
Web threats
Social Networks
Industrial espionage
Organizational security
Law and Legislation
Technical means of protection
The future attacks and information security
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
Přibyl, T. Počítačové viry v roce 2004, IDG, 2003 (CS)
Recommended reading
Classification of course in study plans
- Programme BAK Bachelor's
branch BAK-EPM , 1 year of study, winter semester, elective (voluntary)
branch BAK-MTK , 1 year of study, winter semester, elective (voluntary)
branch BAK-EP , 1 year of study, winter semester, elective (voluntary)
branch BAK-UAD , 1 year of study, winter semester, elective (voluntary) - Programme BAK-KME Bachelor's
branch BAK-MME , 1 year of study, winter semester, elective (voluntary)
- Programme BAK-MIn Bachelor's
branch BAK-MIn , 1 year of study, winter semester, elective (voluntary)
- Programme MGR Master's
branch MGR-ŘEP , 1 year of study, winter semester, elective (voluntary)
branch MGR-PFO , 1 year of study, winter semester, elective (voluntary)
branch MGR-UFRP , 1 year of study, winter semester, elective (voluntary) - Programme MGR-SI Master's
branch MGR-IM , 1 year of study, winter semester, elective (voluntary)
Type of course unit
Exercise
Teacher / Lecturer
Syllabus
Kyberzločin
Škodlivé kódy
Spam a elektronická pošta
Nebezpečí související s elektronickou identitou
Webové hrozby
Sociální sítě
Průmyslová špionáž
Organizační bezpečnost
Právo a legislativa
Technické prostředky ochrany
Budoucnost útoků a informační bezpečnosti