Course detail
IS security branch management
FP-IombPAcad. year: 2015/2016
The course aims to familiarize students with various aspects of security and data protection in information systems associated with the widespread use of computer networks, particularly the Internet. Security is discussed during the design of the information system, the deployment of ICT in the company and its operation. It also includes the issue of digital documents and their security tools, such as electronic signature, electronic mark and a time stamp. They also mentioned the basic elements of security infrastructure and all the reading is completed with the legal aspects of selected topics. Part of the course is also the issue of cybercrime.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
Demonstrate knowledge of the methodology to build secure information systems based on the norms of ČSN ISO / IEC 27000.
Prerequisites
Knowledge of the issues of information technology.
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
2. The security threats in IS - description of the basic threats and their evaluation
3. Security threats on the Internet - a description of the threats associated with the work on the Internet
4. Proposal of IS security - basic concepts, policy, plans ensure safety
5th Information Security Management System - design of IS security, ISO 27000 standard
6. Introduction to the security of information - a basic overview of methods to protect information
7. Security of communication - ensuring security of communication on the Internet
8. The instruments and electronic documents - definition, properties, security and authentication, electronic signature, electronic mark and a time stamp, data boxes, legal aspects
9th Cyber Crime - forms
10th Cyber crime - the law on cyber security
11th security infrastructure elements - elements such as firewalls or demilitarized zone
12th Data Backup and safety criteria - backup methods and their comparison
Work placements
Aims
b) Understand the legal aspects of IT security.
c) Summary of manifestations of cybercrime and methods of combating it.
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
Jordán, V., Ondrák, V. Kritické aplikace. Brno: CERM Akademické nakladatelství 2015, 232 str., ISBN: 978-80-5240-4. (CS)
Kissel, R. Small Business Information Security: The Fundamentals. NST, 2009. (EN)
Ondrák, V., Sedlák, P. a V. Mazálek Problematika ISMS v manažerské informatice. Brno: CERM Akademické nakladatelství, 2014. 378 s. ISBN 978-80-7204-872-4. (CS)
Recommended reading
Classification of course in study plans