Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2025/2026

Human Aspects in Cryptography and Security

Display time-table
Code Completion Credits Range Language
BI-HAS Z,ZK 5 2P+1C Czech
Course guarantor:
Ivana Trummová
Lecturer:
Ivana Trummová
Tutor:
Ivana Trummová
Supervisor:
Department of Information Security
Synopsis:

This course is for students interested not only in technical scope of computer science, but also in making products usable - for users and for developers. Students of this course can use their gained knowledge to design, plan and analyse their own projects in the context of human-centered security.

Requirements:

There are no prerequisites to attend this course. It is recommended to have completed BIE-KAB or an equivalent course, as basic knowledge of cryptography is expected.

Syllabus of lectures:

1.Introduction and key concepts in human-centered security

2.Secure email, PGP

3.Mental models, metaphors

4.Passwords, passwordless authentication

5.Secure messaging apps, end-to-end encryption

6.Cryptography standards, TLS

7.Usability, developer-driven design

8.Security in management and organizations

9.Trust

10.Ethical aspects of cryptography I

11.Ethical aspects of cryptography II

12.Phishing, social engineering

13.Projects presentation, consultation

Syllabus of tutorials:

1. Key management

2. Passwords managers

3. Standards, RFC

4. Messengers

5. Computer security trolley problems

6. Chosen topics discussion

Study Objective:

Student will view a broad portfolio of cryptography and security areas through a new lens and user-centered perspective. At the end of this course, student will be able to critically assess how human factors affect computer systems security.

Study materials:

Bossomaier, Terry, Steven D'Alessandro, and Roger Bradbury. Human dimensions of cybersecurity. CRC Press, 2019.

Sasse, M. Angela, and Ivan Flechais. „Usable security: Why do we need it? How do we get it?.“ O'Reilly, 2005. 13-30.

Sasse, Martina Angela, Sacha Brostoff, and Dirk Weirich. „Transforming the weakest linka human/computer interaction approach to usable and effective security.“ BT technology journal 19.3 (2001): 122-131.

Anne Adams and Martina Angela Sasse. 1999. Users are not the enemy. Commun. ACM 42, 12 (Dec. 1999), 4046. https://doi.org/10.1145/322796.322806

Note:
Further information:
https://courses.fit.cvut.cz/BI-HAS/
Time-table for winter semester 2025/2026:
Time-table is not available yet
Time-table for summer semester 2025/2026:
Time-table is not available yet
The course is a part of the following study plans:
Data valid to 2025-05-19
For updated information see http://bilakniha.cvut.cz/en/predmet7936806.html