Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2023/2024

Information Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range
17XIB ZK
Garant předmětu:
Róbert Lórencz
Lecturer:
Jiří Buček, Róbert Lórencz
Tutor:
Jiří Buček, Róbert Lórencz
Supervisor:
Department of Nuclear Reactors
Synopsis:

Students will acquire theoretical and practical experience and knowledge of network and system security. The aim of the course is to provide students with the interconnection of physical, system and network security of ICT systems. Students will get acquainted with selected methods of monitoring and analyzing network traffic as a means of detecting unwanted behaviour of stations and network elements. The goal is to distinguish regular network traffic from attacks and provide information about the affected network infrastructure. This is followed with a topic on system security that deals with the security of operating systems and their components as well as their interactions with network elements and users. Penetration testing is an integral part of network and system security that tries to detect network and system infrastructure vulnerabilities in order to prevent potential attacks. The following lecture is devoted to responding to a security incident, which includes both defensive measures to stop an ongoing attack and a security incident recovery measure. Digital forensic analysis is an analytical method that provides information on how to perform an attack and its impact. A special topic is devoted to basic information about methods for detecting malware and the use of related detection tools. The last topic discusses the problem of cyber security of industrial equipment with an emphasis on electronic components used in nuclear facilities

Requirements:
Syllabus of lectures:

1. Traffic monitoring, analysis of data protocols in the network

2. System security

3. The relationship of physical, system and network security in ICT infrastructure

4. Penetration testing and ethical hacking

5. Responding to a security incident

6. Digital forensic analysis

7. Malware detection

8. Cyber-attacks on IT infrastructure of industrial facilities

Syllabus of tutorials:
Study Objective:
Study materials:

Sadler, T. L.: Cybersecurity for Everyone: Securing Your Home or Small Business Network. Signalman Publishing, USA, 2014

Harrington, J. L.: Network security: A practical approach, Elsevier, 2005

Forouzan, B. A.: Cryptography & Network Security (1 ed.). McGraw-Hill, Inc., New York, NY, USA, 2007

Note:
Time-table for winter semester 2023/2024:
Time-table is not available yet
Time-table for summer semester 2023/2024:
Time-table is not available yet
The course is a part of the following study plans:
Data valid to 2024-04-19
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/en/predmet7027806.html