Information Security
Code | Completion | Credits | Range |
---|---|---|---|
17XIB | ZK |
- Course guarantor:
- Róbert Lórencz
- Lecturer:
- Jiří Buček, Róbert Lórencz
- Tutor:
- Jiří Buček, Róbert Lórencz
- Supervisor:
- Department of Nuclear Reactors
- Synopsis:
-
Students will acquire theoretical and practical experience and knowledge of network and system security. The aim of the course is to provide students with the interconnection of physical, system and network security of ICT systems. Students will get acquainted with selected methods of monitoring and analyzing network traffic as a means of detecting unwanted behaviour of stations and network elements. The goal is to distinguish regular network traffic from attacks and provide information about the affected network infrastructure. This is followed with a topic on system security that deals with the security of operating systems and their components as well as their interactions with network elements and users. Penetration testing is an integral part of network and system security that tries to detect network and system infrastructure vulnerabilities in order to prevent potential attacks. The following lecture is devoted to responding to a security incident, which includes both defensive measures to stop an ongoing attack and a security incident recovery measure. Digital forensic analysis is an analytical method that provides information on how to perform an attack and its impact. A special topic is devoted to basic information about methods for detecting malware and the use of related detection tools. The last topic discusses the problem of cyber security of industrial equipment with an emphasis on electronic components used in nuclear facilities
- Requirements:
- Syllabus of lectures:
-
1. Traffic monitoring, analysis of data protocols in the network
2. System security
3. The relationship of physical, system and network security in ICT infrastructure
4. Penetration testing and ethical hacking
5. Responding to a security incident
6. Digital forensic analysis
7. Malware detection
8. Cyber-attacks on IT infrastructure of industrial facilities
- Syllabus of tutorials:
- Study Objective:
- Study materials:
-
Sadler, T. L.: Cybersecurity for Everyone: Securing Your Home or Small Business Network. Signalman Publishing, USA, 2014
Harrington, J. L.: Network security: A practical approach, Elsevier, 2005
Forouzan, B. A.: Cryptography & Network Security (1 ed.). McGraw-Hill, Inc., New York, NY, USA, 2007
- Note:
- Time-table for winter semester 2024/2025:
- Time-table is not available yet
- Time-table for summer semester 2024/2025:
- Time-table is not available yet
- The course is a part of the following study plans: