Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2023/2024
UPOZORNĚNÍ: Jsou dostupné studijní plány pro následující akademický rok.

Security of Information Systems and Networks

The course is not on the list Without time-table
Code Completion Credits Range Language
17KBP2BIS Z,ZK 3 8P+6C Czech
Garant předmětu:
Lecturer:
Tutor:
Supervisor:
Department of Health Care Disciplines and Population Protection
Synopsis:

Study is focused on understanding the principles of security risks in information technology, the preventive treatment and management. Students will learn the basic principles of security, understand the sense of security in large information systems. Students will learn the principles of the new solution practices, which lead to the design, installation, operation and maintenance of secure information systems.

Requirements:

Written proof of acquired knowledge test.

Syllabus of lectures:

Network topology and network protocols

Securing data (content)

Data Encryption

Introduction to Quantum Cryptography

Network Security

Authorization and Authentication

Physical security

Security Audit

Security of information systems in the financial and security sector

Syllabus of tutorials:

TCP / IP, MPLS and other networking protocols

Ensure reliable transmission, Interleaving

Data encryption, symmetric and asymmetric ciphers, cryptography, Vernam cipher, Enigma

The principles of quantum cryptography and examples of detection of eavesdropping

Firewall, VPN, WLAN, intranet,

Single Sign On, Active Directory, PKI, key management (electronic signature, banking)

Standards, certification and hardware security

Draft standard security audit case study

Transaction Systems, Security TRX

Study Objective:

To acquaint students with advanced security mechanisms in information systems.

Study materials:

[1] Kally F., Peniak,P.: Počítačové sítě, Nakladatelství Grada, Praha 2003

[2] Halsall F.: Computer Networking and the Internet. Addison-Wesley, 5 vydání, 2005.

[3] Halsall F.: Data Communications, Computer Networks and Open Systems. Addison-Wesley, 1996

[4] Stallings, W.: Cryptography and network security: principles and practice. 2nd ed., Prentice Hall, Upper Saddle River, 1999, ISBN 0-13-869017-0

[5] Schneider, S.A., Ryan, P.Y.A.: Modelling and Analysis of Security Protocols. Addison Wesley, Boston, 2000, ISBN 0-201-67471-8.Bishop

[6] M.: Computer security: Art & Science. Addison-Wesley, Boston, 2003, ISBN 0-201-44099-7.

[7] Anderson, Ross J.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons Inc, 2001, ISBN 0-471-38922-6.

[8] Menezes, A. J., Oorschot, P.C. van, Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, 1996, ISBN 0-8493-8523-7, http://www.cacr.math.uwaterloo.ca/hac/ Tanenbaum, A.S.: Computer Networks. Fourth Edition, Prentice Hall, 2003, ISBN 0-13-066102-3.Standardy IETF RFC

Note:
Further information:
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2024-03-27
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/en/predmet3082206.html