Course detail
ICT Security
FP-BISTAcad. year: 2018/2019
The course focuses on the following topics: information security and availability in IS, communication security, security strategy and security management.
Language of instruction
Czech
Number of ECTS credits
5
Mode of study
Not applicable.
Guarantor
Department
Learning outcomes of the course unit
Students will gain a basic knowledge of information security - possible security threats, security measures.
After completing the course students will be able to classify assets, analyse security risks in IS / IT and propose comprehensive solutions for their prevention, so as to create security company strategy and proposed safety management system of firm.
After completing the course students will be able to classify assets, analyse security risks in IS / IT and propose comprehensive solutions for their prevention, so as to create security company strategy and proposed safety management system of firm.
Prerequisites
Computer literacy, knowledge of operating systems, computer networks, cryptography.
Co-requisites
Not applicable.
Planned learning activities and teaching methods
The course contains lectures that explain basic principles, problems and methodology of the discipline.
Assesment methods and criteria linked to learning outcomes
The course is not concluded by a course-unit credit:
Conditions for passing an exam: Knowledge of taught topics and its practical application.
Form of examination is combined:
- a written test of 50 questions, must correctly answer at least 25 questions, according to ECTS classification,
- an oral examination.
Resulting from simple arithmetic average of the two parts.
Conditions for passing an exam: Knowledge of taught topics and its practical application.
Form of examination is combined:
- a written test of 50 questions, must correctly answer at least 25 questions, according to ECTS classification,
- an oral examination.
Resulting from simple arithmetic average of the two parts.
Course curriculum
Not applicable.
Work placements
Not applicable.
Aims
The main objective of the course is to provide students with the necessary knowledge with respect to IS/IT security, to teach them how to apply the risk analysis as well as to design corporate safety strategy of firm.
Specification of controlled education, way of implementation and compensation for absences
Attendance at lessons is not checked. The course consists of lectures only, and the attendance at them is not compulsory
Recommended optional programme components
Not applicable.
Prerequisites and corequisites
Not applicable.
Basic literature
Doseděl, T.: Počítačová bezpečnost a ochrana dat. Computer Press 2004, ISBN 80-251-0106-1 (CS)
Dostálek, L. a kol.: Velký průvodce protokoly TCP/IP: Bezpečnost. Computer Press. ISBN 80-7226-849-X (CS)
Hanáček, P. a J. Saudek. Bezpečnost informačních systémů, ÚSIS, Praha, 2000, 127 s. ISBN 80-238-5400-3 (CS)
Dostálek, L. a kol.: Velký průvodce protokoly TCP/IP: Bezpečnost. Computer Press. ISBN 80-7226-849-X (CS)
Hanáček, P. a J. Saudek. Bezpečnost informačních systémů, ÚSIS, Praha, 2000, 127 s. ISBN 80-238-5400-3 (CS)
Recommended reading
Anonymous. Maximální bezpečnost. SoftPress 2004. ISBN 0672324598 (CS)
Gurbani, V. a U. Parbrai. Internet and TCP/IP Networdk Security: Securing protocols and applications. McGraw – Hill, New York 1996. 357s. ISBN 0-07-048215-2 (EN)
Horák, J. Bezpečnost malých počítačových sítí. Grada. 2003. ISBN 80-247-0663-6 (CS)
Prosise, C. a K. Mandia. Počítačový útok Detekce, obrana a okamžitá náprava. Computer Press. ISBN 80-7226682-9 (CS)
Pužmanová, R. Bezpečnost bezdrátové komunikace, (CS)
Savard, J. J. G. A Cryptographic Compendium, 2000 Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0 (EN)
Strebe, M. a C. Perkins. Firewally a proxy-servery. Computer Press. ISBN 80-722-6983-6 (EN)
Gurbani, V. a U. Parbrai. Internet and TCP/IP Networdk Security: Securing protocols and applications. McGraw – Hill, New York 1996. 357s. ISBN 0-07-048215-2 (EN)
Horák, J. Bezpečnost malých počítačových sítí. Grada. 2003. ISBN 80-247-0663-6 (CS)
Prosise, C. a K. Mandia. Počítačový útok Detekce, obrana a okamžitá náprava. Computer Press. ISBN 80-7226682-9 (CS)
Pužmanová, R. Bezpečnost bezdrátové komunikace, (CS)
Savard, J. J. G. A Cryptographic Compendium, 2000 Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0 (EN)
Strebe, M. a C. Perkins. Firewally a proxy-servery. Computer Press. ISBN 80-722-6983-6 (EN)
Classification of course in study plans
Type of course unit
Lecture
26 hod., optionally
Teacher / Lecturer
Syllabus
Topics of lectures are the following:
- Introduction to IS/IT
- Safety management
- Safety risks analysis
- Loss of information, defence methods
- Abuse of information, defence methods
- Safety attacks, defence methods
- Corporate security strategy
- Introduction to IS/IT
- Safety management
- Safety risks analysis
- Loss of information, defence methods
- Abuse of information, defence methods
- Safety attacks, defence methods
- Corporate security strategy