Applications of Security in Technology
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
BIE-TAB.21 | Z,ZK | 5 | 2P+2C | English |
- Garant předmětu:
- Lecturer:
- Tutor:
- Supervisor:
- Department of Information Security
- Synopsis:
-
The goal of the course is to introduce students to selected topics from cybersecurity technical applications that are utilized in different industries. Students get a broader overview of cybersecurity applications and extend their knowledge from the cryptology, the secure code, and system, network, and hardware security.
- Requirements:
-
Prerequisites and co-requisites Basic knowledge of BI-KAB is assumed.
- Syllabus of lectures:
-
1. Secure wireless transfers.
2. Software Defined Radio.
4. Mobile networks.
5. Internet of Things security.
6. Automotive security architecture
7. Global navigation satellite systems.
8. Precise time in Internet.
9. Healthcare security.
10. Security of industrial control systems.
11. Blockchain technology.
12. Security and artificial intelligence.
13. Smart Cities security.
- Syllabus of tutorials:
-
1. Secure wireless transfers.
2. Software Defined Radio.
4. Mobile networks.
5. Internet of Things security.
6. Automotive security architecture
7. Global navigation satellite systems.
8. Precise time in Internet.
9. Healthcare security.
10. Security of industrial control systems.
11. Blockchain technology.
12. Security and artificial intelligence.
13. Smart Cities security.
- Study Objective:
-
The goal of the course is to introduce students to selected topics from cybersecurity technical applications that are utilized in different industries.
- Study materials:
-
1. Smith C. : Car Hacker’s Handbook. No Starch Press, 2016. ISBN 978-1-59327-703-1.
2. Knapp E., Langill J. : Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems (2nd Edition). Syngress, 2014. ISBN 978-0124201149.
3. Waleed E., Anpalagan A. : Internet of Things for Smart Cities: Technologies, Big Data and Security. Springer, 2018. ISBN 978-3319950365.
- Note:
- Further information:
- No time-table has been prepared for this course
- The course is a part of the following study plans:
-
- Bachelor Specialization, Information Security, 2021 (compulsory elective course)
- Bachelor Specialization, Software Engineering, 2021 (VO)
- Bachelor Specialization, Computer Science, 2021 (VO)
- Bachelor Specialization, Computer Networks and Internet, 2021 (VO)
- Bachelor Specialization Computer Systems and Virtualization, 2021 (VO, compulsory elective course)
- Bachelor Specialization, Computer Engineering, Version 2024 (VO)