Course detail
Information System Security and Cryptography
FIT-BIDAcad. year: 2024/2025
Introduction, security standards, security management. Evaluation of security. Data transmission security, operating system and database security. Cryptographic algorithms and analysis, public key cryptography. Electronic commerce. Tamper resistant hardware.
Doctoral state exam - topics:
- Information system security basics.
- Security evaluation standards.
- Security policies.
- Basic security functions.
- Symmetric cryptography.
- Asymmetric cryptography.
- Public key infrastructure - PKI.
- Web applications security.
- Communication security.
- Operating system security.
Language of instruction
Mode of study
Guarantor
Department
Entry knowledge
Rules for evaluation and completion of the course
Project and presentation of selected article
Aims
Students will learn basic principles of secure information systems design and security analysis.
A deeper ability to design secure systems.
Study aids
Prerequisites and corequisites
Basic literature
Recommended reading
Savard, J. J. G.: A Cryptographic Compendium, 2000, dostupné na WWW
Stallings, W.: Cryptography and Network Security, Pearson India, 2018, ISBN 9789332585225
Elearning
Classification of course in study plans
- Programme DIT Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DIT Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DIT-EN Doctoral 0 year of study, summer semester, compulsory-optional
- Programme DIT-EN Doctoral 0 year of study, summer semester, compulsory-optional
- Programme CSE-PHD-4 Doctoral
branch DVI4 , 0 year of study, summer semester, elective
- Programme CSE-PHD-4 Doctoral
branch DVI4 , 0 year of study, summer semester, elective
- Programme CSE-PHD-4 Doctoral
branch DVI4 , 0 year of study, summer semester, elective
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
- Introduction
- Security standardisation
- Security management
- Security evaluation and audit
- Selected security mechanisms
- Advance cryptographic algorithms
- Public key infrastructure (PKI)
- Electronic commerce
- Tamper resistant hardware
Guided consultation in combined form of studies
Teacher / Lecturer
Project
Teacher / Lecturer
Syllabus
Elearning