Course: Cybernetic Security

» List of faculties » FLK » LUOO
Course title Cybernetic Security
Course code LUOO/L4SKB
Organizational form of instruction Lecture + Lesson
Level of course Bachelor
Year of study not specified
Semester Summer
Number of ECTS credits 4
Language of instruction Czech
Status of course Compulsory, Compulsory-optional
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Švaňhal Marek, Ing.
  • Svoboda Petr, Ing. Ph.D.
  • Valášek Pavel, Ing.
Course content
Definition of safety. Systems theory. Model theory and modeling. Cybernetics and informatics. Information and cyber security. Defining cyberspace. Modeling of cybernetic system and cyber security. Cyber attack, defense and security. Possibilities of systematic recognition of aggressive cyberspace. World resources about the modern concept of information and cyber security. Protection of information and cybernetic systems and possibilities of modeling and simulations. Development and use of new means of cybernetics and their security. Solution of cyber security project by means of modeling (CAD and others). Summary of subject matter and tutorials.

Learning activities and teaching methods
Lecturing, Monologic (Exposition, lecture, briefing), Dialogic (Discussion, conversation, brainstorming), Exercises on PC, Practice exercises, Teamwork
  • Participation in classes - 56 hours per semester
  • Home preparation for classes - 30 hours per semester
  • Preparation for course credit - 10 hours per semester
  • Preparation for examination - 15 hours per semester
prerequisite
Knowledge
Basic knowledge of information and communication technologies. Basics of work with personal computer, mobile devices and internet.
Basic knowledge of information and communication technologies. Basics of work with personal computer, mobile devices and internet.
learning outcomes
Characterize the content and context of the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti)
Characterize the content and context of the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti)
Define basic terms in the field of cyber security
Define basic terms in the field of cyber security
Specify examples of historical cyber security incidents
Specify examples of historical cyber security incidents
Discuss the issue of systems theory
Discuss the issue of systems theory
Discuss the issue of theoretical cybernetics
Discuss the issue of theoretical cybernetics
Skills
Prepare an instrumental and descriptive case study
Prepare an instrumental and descriptive case study
Identify the theoretical aspects in a real cyber security incident
Identify the theoretical aspects in a real cyber security incident
Assess the entity's obligations under the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti)
Assess the entity's obligations under the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti)
Identify the protected interests of the subject in the field of cyber security and possible vulnerabilities
Identify the protected interests of the subject in the field of cyber security and possible vulnerabilities
To propose procedures to increase the cyber security of the subject
To propose procedures to increase the cyber security of the subject
teaching methods
Knowledge
Exercises on PC
Dialogic (Discussion, conversation, brainstorming)
Dialogic (Discussion, conversation, brainstorming)
Monologic (Exposition, lecture, briefing)
Monologic (Exposition, lecture, briefing)
Exercises on PC
Lecturing
Practice exercises
Practice exercises
Teamwork
Teamwork
Lecturing
assessment methods
Conversation
Workplace supervision
Workplace supervision
Preparation of a presentation
Preparation of a presentation
Didactic test
Didactic test
Oral examination
Oral examination
Conversation
Essay
Essay
Recommended literature
  • SVOBODNÝ PŘÍSTUP K INFORMACÍM : informatika, služby vytvářející důvěru, elektronické komunikace, egovernment, elektronické úkony a konverze dokumentů, informační systémy veřejné správy, kybernetická bezpečnost, základní registry, elektronická identifikace (od 1.7.2018) ; redakční uzávěrka 4.9.2017. Ostrava, 2017. ISBN 978-80-7488-244-9.
  • Zákon č. 181/2014 Sb. o kybernetické bezpečnosti a o změně souvisejících zákonů (zákon o kybernetické bezpečnosti). Praha, 2014.
  • J. Dvořák a kol. Kybernetická bezpečnost jako součást kyberprostoru moderní znalostní společnosti. Brno, 2017.
  • J. Dvořák a kol. Modelling of Processes of Logistics in Cyberspace Security. 2017.
  • J. Dvořák a kol. Modely systémově vymezených procesů pro kybernetickou bezpečnost. Brno, 2016.
  • Jan Čapek, Renáta Máchová. Teoretické základy informatiky : distanční opora. Pardubice, 2013. ISBN 978-80-7395-574-8.
  • Louie Stowell. Bezpečně online. Praha, 2017. ISBN 978-80-256-2083-0.
  • Martin Kožíšek. Bezpečně n@ internetu: průvodce chováním ve světě online. Praha, 2016. ISBN 978-80-247-5595-3.
  • Martin Maisner. Zákon o kybernetické bezpečnosti: komentář. Praha, 2015. ISBN 978-80-7478-817-8.
  • Misha Glenny. Temný trh: kyberzloději, kyberpolicisté a vy. Praha, 2013. ISBN 978-80-7363-522-0.
  • O. Čech. Nebezpečí kyberšikany : internet jako zbraň?. České Budějovice, 2017. ISBN 978-80-904854-4-0.
  • Petr Hrůza a kol. Kybernetická bezpečnost II. Brno, 2013. ISBN 978-80-7231-931-2.
  • Petr Hrůza. Kybernetická bezpečnost. Brno, 2012. ISBN 978-80-7231-914-5.
  • Roland Heickero. The dark sides of the Internet: on cyber threats and information warfare. Frankfurt, 2013. ISBN 978-3-631-62478-4.
  • Roman Kohout, Sandra Kubíčková. Internetem bezpečně. Karlovy Vary, 2017. ISBN 978-80-270-1148-3.
  • Vladimír Smejkal. Kybernetická kriminalita. Plzeň, 2015. ISBN 978-80-7380-501-2.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester