Lecturer(s)
|
-
Králík Lukáš, Ing. Ph.D.
-
Albrecht Jan, Ing.
|
Course content
|
1. Introduction to the study of the subject 2. Threats, risks and administrative security measures 3. Protection of personal data, classified information and special facts (GDPR, Act No. 412/2005 Coll., No. 240/2000 Coll.) 4. ISMS (ISO 27001 and related) 5. Archiving and record service (Act No. 499/2004 Coll.) 6. Demonstration of ESSS operation 7. Functions of the record service 8. Electronic record service system 9. Implementation and operation of ESSS 10. Data boxes 11. Digital archiving 12. Trends in the record service
|
Learning activities and teaching methods
|
Monologic (Exposition, lecture, briefing), Practice exercises, Individual work of students
|
prerequisite |
---|
Knowledge |
---|
The basic prerequisites for the study of the subject are computer skills for working with documents and knowledge of basic concepts and terms in the field of security. Students should also know the basic tools and equipments for ensuring cyber security. |
The basic prerequisites for the study of the subject are computer skills for working with documents and knowledge of basic concepts and terms in the field of security. Students should also know the basic tools and equipments for ensuring cyber security. |
learning outcomes |
---|
characterise the definition of means for document protection |
characterise the definition of means for document protection |
describe the definition of the scope of protection of personal data |
describe the definition of the scope of protection of personal data |
define the establishment of basic principles for document protection |
define the establishment of basic principles for document protection |
explain what classified information is and describe the different classification levels |
explain what classified information is and describe the different classification levels |
describe the different levels of electronic signature according to legislative regulations |
describe the different levels of electronic signature according to legislative regulations |
Skills |
---|
apply electronic signature in electronic mail (email) and documents |
apply electronic signature in electronic mail (email) and documents |
draw up a concept for the protection of personal data |
draw up a concept for the protection of personal data |
design an information security management system |
design an information security management system |
use appropriate cryptographic tools to secure electronic documents |
use appropriate cryptographic tools to secure electronic documents |
suggest a suitable method of backing up electronic documents |
suggest a suitable method of backing up electronic documents |
teaching methods |
---|
Knowledge |
---|
Individual work of students |
Monologic (Exposition, lecture, briefing) |
Monologic (Exposition, lecture, briefing) |
Individual work of students |
Practice exercises |
Practice exercises |
assessment methods |
---|
Written examination |
Written examination |
Recommended literature
|
-
DOUCEK, Petr, Luděk NOVÁK, Lea NEDOMOVÁ a Vlasta SVATÁ. Řízení bezpečnosti informací. Praha, 2011. ISBN 978-80-7431-050-8.
-
KUNT, Miroslav a Tomáš LECHNER. Spisová služba. Praha, 2017. ISBN 978-80-7502-233-2.
-
LUKÁŠ, Luděk. Teorie bezpečnosti. Zlín, 2017. ISBN 978-80-87500-89-7.
-
NAVRÁTIL, Jiří. GDPR pro praxi. Plzeň, 2018. ISBN 978-8073-806-89-7.
|