Lecturer(s)
|
-
Švaňhal Marek, Ing.
-
Svoboda Petr, Ing. Ph.D.
-
Valášek Pavel, Ing.
|
Course content
|
Definition of safety. Systems theory. Model theory and modeling. Cybernetics and informatics. Information and cyber security. Defining cyberspace. Modeling of cybernetic system and cyber security. Cyber attack, defense and security. Possibilities of systematic recognition of aggressive cyberspace. World resources about the modern concept of information and cyber security. Protection of information and cybernetic systems and possibilities of modeling and simulations. Development and use of new means of cybernetics and their security. Solution of cyber security project by means of modeling (CAD and others). Summary of subject matter and tutorials.
|
Learning activities and teaching methods
|
Lecturing, Monologic (Exposition, lecture, briefing), Dialogic (Discussion, conversation, brainstorming), Exercises on PC, Practice exercises, Teamwork
- Participation in classes
- 56 hours per semester
- Home preparation for classes
- 30 hours per semester
- Preparation for course credit
- 10 hours per semester
- Preparation for examination
- 15 hours per semester
|
prerequisite |
---|
Knowledge |
---|
Basic knowledge of information and communication technologies. Basics of work with personal computer, mobile devices and internet. |
Basic knowledge of information and communication technologies. Basics of work with personal computer, mobile devices and internet. |
learning outcomes |
---|
Characterize the content and context of the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti) |
Characterize the content and context of the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti) |
Define basic terms in the field of cyber security |
Define basic terms in the field of cyber security |
Specify examples of historical cyber security incidents |
Specify examples of historical cyber security incidents |
Discuss the issue of systems theory |
Discuss the issue of systems theory |
Discuss the issue of theoretical cybernetics |
Discuss the issue of theoretical cybernetics |
Skills |
---|
Prepare an instrumental and descriptive case study |
Prepare an instrumental and descriptive case study |
Identify the theoretical aspects in a real cyber security incident |
Identify the theoretical aspects in a real cyber security incident |
Assess the entity's obligations under the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti) |
Assess the entity's obligations under the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti) |
Identify the protected interests of the subject in the field of cyber security and possible vulnerabilities |
Identify the protected interests of the subject in the field of cyber security and possible vulnerabilities |
To propose procedures to increase the cyber security of the subject |
To propose procedures to increase the cyber security of the subject |
teaching methods |
---|
Knowledge |
---|
Exercises on PC |
Dialogic (Discussion, conversation, brainstorming) |
Dialogic (Discussion, conversation, brainstorming) |
Monologic (Exposition, lecture, briefing) |
Monologic (Exposition, lecture, briefing) |
Exercises on PC |
Lecturing |
Practice exercises |
Practice exercises |
Teamwork |
Teamwork |
Lecturing |
assessment methods |
---|
Conversation |
Workplace supervision |
Workplace supervision |
Preparation of a presentation |
Preparation of a presentation |
Didactic test |
Didactic test |
Oral examination |
Oral examination |
Conversation |
Essay |
Essay |
Recommended literature
|
-
SVOBODNÝ PŘÍSTUP K INFORMACÍM : informatika, služby vytvářející důvěru, elektronické komunikace, egovernment, elektronické úkony a konverze dokumentů, informační systémy veřejné správy, kybernetická bezpečnost, základní registry, elektronická identifikace (od 1.7.2018) ; redakční uzávěrka 4.9.2017. Ostrava, 2017. ISBN 978-80-7488-244-9.
-
Zákon č. 181/2014 Sb. o kybernetické bezpečnosti a o změně souvisejících zákonů (zákon o kybernetické bezpečnosti). Praha, 2014.
-
J. Dvořák a kol. Kybernetická bezpečnost jako součást kyberprostoru moderní znalostní společnosti. Brno, 2017.
-
J. Dvořák a kol. Modelling of Processes of Logistics in Cyberspace Security. 2017.
-
J. Dvořák a kol. Modely systémově vymezených procesů pro kybernetickou bezpečnost. Brno, 2016.
-
Jan Čapek, Renáta Máchová. Teoretické základy informatiky : distanční opora. Pardubice, 2013. ISBN 978-80-7395-574-8.
-
Louie Stowell. Bezpečně online. Praha, 2017. ISBN 978-80-256-2083-0.
-
Martin Kožíšek. Bezpečně n@ internetu: průvodce chováním ve světě online. Praha, 2016. ISBN 978-80-247-5595-3.
-
Martin Maisner. Zákon o kybernetické bezpečnosti: komentář. Praha, 2015. ISBN 978-80-7478-817-8.
-
Misha Glenny. Temný trh: kyberzloději, kyberpolicisté a vy. Praha, 2013. ISBN 978-80-7363-522-0.
-
O. Čech. Nebezpečí kyberšikany : internet jako zbraň?. České Budějovice, 2017. ISBN 978-80-904854-4-0.
-
Petr Hrůza a kol. Kybernetická bezpečnost II. Brno, 2013. ISBN 978-80-7231-931-2.
-
Petr Hrůza. Kybernetická bezpečnost. Brno, 2012. ISBN 978-80-7231-914-5.
-
Roland Heickero. The dark sides of the Internet: on cyber threats and information warfare. Frankfurt, 2013. ISBN 978-3-631-62478-4.
-
Roman Kohout, Sandra Kubíčková. Internetem bezpečně. Karlovy Vary, 2017. ISBN 978-80-270-1148-3.
-
Vladimír Smejkal. Kybernetická kriminalita. Plzeň, 2015. ISBN 978-80-7380-501-2.
|