Course: Special Security Technologies

» List of faculties » FAI » AUEM
Course title Special Security Technologies
Course code AUEM/AE8PB
Organizational form of instruction Lecture + Lesson
Level of course Master
Year of study not specified
Semester Summer
Number of ECTS credits 5
Language of instruction Czech, English
Status of course unspecified
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Křesálek Vojtěch, doc. RNDr. CSc.
  • Goňa Stanislav, Ing. Ph.D.
Course content
1. Introduction. Standard and advanced security technologies to ensure object security a methods for detecting and preventing information leakage using interception devices 2. Standard motion detectors 3. Advanced motion detectors 4. Modern motion detectors and their installation in alarm systems 5. Biometric identification systems 1 (theory of biometrics) 6. Biometric identification systems 2 (fingerptint, sensors) 7. Biometric identification systems 3 (fingerptint, algorithms) 8. Biometric identification systems 4 (face recogniton) 9. Biometric identification systems 5 (other biometric systems) 10. Frequency spectrum and modulation of high frequency and microwave signals (in relation with radio evanesdropping devices) 11. Antennas, Radiorecivers, architecture, basic parameters 12. Eavesdropping devices (line eavesdropping, wireless microphones, laser eavesdropping) 13. Anti-eavesdropping technology (broadband detectors, surveillance receivers, spectrum analyzers, detection of nonlinear transitions) 14. Searching for hidden monitoring devices and cameras. Jamming of frequency spectrum. Laboratories: 1. Introduction, splitting individual laboratory tasks 2. Measurement of laboratory task no. 1 (Modern motion detectors) 2. Measurement of laboratory task no. 2 (Fingerprint reader) 3. Measurement of laboratory task no. 3 (IR camera) 4. Measurement of laboratory task no. 4 (Face recognition Vision 3Di) 5. Computational exercise, RF, MW 6. Computational exercise, antennas, propagation of EM waves 7. Computational exercise, radioreceivers 8. Measurement of laboratory task no. 5 (Wireless radiomicrophones, fscan) 9. Measurement of laboratory task no. 6 (Wireless radiomicrophones, search) 10. Measurement of laboratory task no. 7 (Mobile phone jammer) 11. Measurement of laboratory task no. 8 (Search for a hidden metallic lines) 12. Reserve 13. Classification

Learning activities and teaching methods
Lecturing, Simple experiments, Practice exercises, Students working in pairs
learning outcomes
Knowledge
Describe in detail the physical principles and operation of standard and advanced motion detectors
Describe in detail the physical principles and operation of standard and advanced motion detectors
Familiarize yourself with the technical parameters of motion detectors
Familiarize yourself with the technical parameters of motion detectors
He orients himself in the issue of installing motion detectors
He orients himself in the issue of installing motion detectors
Explain the physical principles of biometric systems, can explain their parameters
Explain the physical principles of biometric systems, can explain their parameters
Describe the functioning of electronic devices for the realization and search of interception of voice communications and hidden cameras
Describe the functioning of electronic devices for the realization and search of interception of voice communications and hidden cameras
Skills
Select the appropriate motion detector for the given application
Select the appropriate motion detector for the given application
Can correctly position and set the motion detector
Can correctly position and set the motion detector
It can connect the motion detector to the arming control panel using a suitable bus
It can connect the motion detector to the arming control panel using a suitable bus
Can work with biometric systems based on fingerprint and 2D/3D face recognition
Can work with biometric systems based on fingerprint and 2D/3D face recognition
Can Use a technique to perform and locate wiretapping of voice communications
Can Use a technique to perform and locate wiretapping of voice communications
teaching methods
Knowledge
Lecturing
Lecturing
Students working in pairs
Students working in pairs
Practice exercises
Simple experiments
Practice exercises
Simple experiments
assessment methods
Written examination
Written examination
Recommended literature
  • C. Rauscher. Fundamentals of spectrum analysis. Munich, 2008. ISBN 978-3-939837-01-0.
  • Černohorský D., Nováček Z., Raida Z. Elektromagnetické vlny a vedení. Brno, 1999.
  • D. Maltoni. Handbook of Fingerprint Recognition. 2009. ISBN 978-0387954318.
  • G. Honey. Intruder Alarms. 2007. ISBN 9780750681674.
  • Rak, R., Matyáš, V., Říha, Z. a kol. Biometrie a identita člověka ve forenzních a komerčních aplikacích. Grada, 2008. ISBN 978-80-247-6392-7.
  • R.Bansal. Handbook of engineering electromagnetics. New York: Marcel Dekker, 2004. ISBN 0-8247-5628-2.
  • S.Goňa. Kompletní systém prezentací ve formátu PowerPoint umístěných na serveru univerzity. Zlín, 2020.
  • S.Z. Li. Handbook of Face Recognition. 2011. ISBN 978-0857299314.
  • Šebesta V. Systémy procesy signály. Brno, PC-DIR, 1995.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester