Course detail
Information system security
FEKT-LBISAcad. year: 2010/2011
Basic terms. Cryptography security mechanisms (encrypting, signing, hashing). Communication security mechanisms (filtering methods, spread spectrum methods, error control codes and protocols). Computer security mechanisms (access control, intrusion detection, software protection, data security, backup, audit, emission security). Other security mechanisms. Security policy. Risk analysis and management. Evaluations of the information system security.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
1. Basic terms.
2. Symmetric cryptosystems.
3. Asymmetric cryptosystems.
4. Secure communications protocols.
5. Emission security.
6. Error codes.
7. Protections of communications channels.
8. Filtering methods, intrusion detection systems.
9. Access control methods.
10. Computer security.
11. Physical protections.
12. Security management in information systems.
13. Security evaluations of information systems.
Numerical excercises:
1. Applications of secrecy theory.
2. Applications of symmetric cryptography.
3. Applications of asymmetric cryptography.
4. Applications of secure communication protocols.
5. Applications of emission security.
6. Applications of error codes.
7. Applications of spread spectrum methods.
8. Applications of communications controls.
9. Applications of access methods.
10. Applications of software protections.
11. Physical security in practice.
12. Risk management in practice.
13. Applications of ISO 15408.
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
Recommended reading
Classification of course in study plans
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
2. Symmetric cryptosystems.
3. Asymmetric cryptosystems.
4. Secure communications protocols.
5. Emission security.
6. Error codes.
7. Protections of communications channels.
8. Filtering methods, intrusion detection systems.
9. Access control methods.
10. Computer security.
11. Physical protections.
12. Security management in information systems.
13. Security evaluations of information systems.
Fundamentals seminar
Teacher / Lecturer
Syllabus
2. Applications of symmetric cryptography.
3. Applications of asymmetric cryptography.
4. Applications of secure communication protocols.
5. Applications of emission security.
6. Applications of error codes.
7. Applications of spread spectrum methods.
8. Applications of communications controls.
9. Applications of access methods.
10. Applications of software protections.
11. Physical security in practice.
12. Risk management in practice.
13. Applications of ISO 15408.