Security of Information Systems and Networks
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
17PBPBIS | Z,ZK | 3 | 1P+1C | Czech |
- Garant předmětu:
- Lecturer:
- Tutor:
- Supervisor:
- Department of Health Care Disciplines and Population Protection
- Synopsis:
-
Study is focused on understanding the principles of security risks in information technology, the preventive treatment and management. Students will learn the basic principles of security, understand the sense of security in large information systems. Students will learn the principles of the new solution practices, which lead to the design, installation, operation and maintenance of secure information systems.
- Requirements:
-
Written proof of acquired knowledge test.
- Syllabus of lectures:
-
Network topology and network protocols
Securing data (content)
Data Encryption
Introduction to Quantum Cryptography
Network Security
Authorization and Authentication
Physical security
Security Audit
Security of information systems in the financial and security sector
- Syllabus of tutorials:
-
TCP / IP, MPLS and other networking protocols
Ensure reliable transmission, Interleaving
Data encryption, symmetric and asymmetric ciphers, cryptography, Vernam cipher, Enigma
The principles of quantum cryptography and examples of detection of eavesdropping
Firewall, VPN, WLAN, intranet,
Single Sign On, Active Directory, PKI, key management (electronic signature, banking)
Standards, certification and hardware security
Draft standard security audit case study
Transaction Systems, Security TRX
- Study Objective:
-
To acquaint students with advanced security mechanisms in information systems.
- Study materials:
-
[1] Kally F., Peniak,P.: Počítačové sítě, Nakladatelství Grada, Praha 2003
[2] Halsall F.: Computer Networking and the Internet. Addison-Wesley, 5 vydání, 2005.
[3] Halsall F.: Data Communications, Computer Networks and Open Systems. Addison-Wesley, 1996
[4] Stallings, W.: Cryptography and network security: principles and practice. 2nd ed., Prentice Hall, Upper Saddle River, 1999, ISBN 0-13-869017-0
[5] Schneider, S.A., Ryan, P.Y.A.: Modelling and Analysis of Security Protocols. Addison Wesley, Boston, 2000, ISBN 0-201-67471-8.Bishop
[6] M.: Computer security: Art & Science. Addison-Wesley, Boston, 2003, ISBN 0-201-44099-7.
[7] Anderson, Ross J.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons Inc, 2001, ISBN 0-471-38922-6.
[8] Menezes, A. J., Oorschot, P.C. van, Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, 1996, ISBN 0-8493-8523-7, http://www.cacr.math.uwaterloo.ca/hac/ Tanenbaum, A.S.: Computer Networks. Fourth Edition, Prentice Hall, 2003, ISBN 0-13-066102-3.Standardy IETF RFC
- Note:
- Further information:
- No time-table has been prepared for this course
- The course is a part of the following study plans:
-
- Planning and Management of Crisis Situation - full-time (compulsory course)