Course: Data Security Technologies

« Back
Course title Data Security Technologies
Course code AUIUI/AK5TD
Organizational form of instruction Lecture
Level of course Bachelor
Year of study not specified
Semester Winter
Number of ECTS credits 4
Language of instruction Czech, English
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Jašek Roman, prof. Mgr. Ph.D., DBA
Course content
The aim of the course is to acquaint students with the key technologies of data security and to present the areas of their application in close connection with the field of study. Topics: 1. Introduction to data security technologies 2. Cybersecurity Act and implementing regulations 3. Symmetric and asymmetric cryptography 4. Electronic signature technology and its complete scheme 5. Server and web certificates 6. SSL and TLS 5. Disk arrays and smart data storage 7. Information Security Management System (ISMS) 8. Blockchain technologies 9. Data backup and archiving 9. GDPR 10. NIS2 11. eIDAS 12. Whistleblower Law 13. Penetration tests 14. Case studies

Learning activities and teaching methods
Lecturing, Exercises on PC
  • Participation in classes - 48 hours per semester
  • Home preparation for classes - 50 hours per semester
  • Preparation for course credit - 10 hours per semester
  • Preparation for examination - 10 hours per semester
  • Educational trip - 0 hours per semester
  • Term paper - 15 hours per semester
  • Participation in classes - 18 hours per semester
prerequisite
Knowledge
Successful completion of subjects related to the theoretical foundations of computer science.
Successful completion of subjects related to the theoretical foundations of computer science.
learning outcomes
describe the organization's information security management system
describe the organization's information security management system
define the meaning of the GDPR general regulation
define the meaning of the GDPR general regulation
explain the principle of asymmetric cryptography
explain the principle of asymmetric cryptography
draw and explain the scheme of an electronic signature
draw and explain the scheme of an electronic signature
describe industrial blockchain technology
describe industrial blockchain technology
Skills
draft the organization's security policy design a strong password and verify its strength choose disk array technology to ensure the continuity of their operation propose a way of backing up data and processes create a suitable hash print of any digital object
draft the organization's security policy design a strong password and verify its strength choose disk array technology to ensure the continuity of their operation propose a way of backing up data and processes create a suitable hash print of any digital object
teaching methods
Knowledge
Lecturing
Lecturing
Exercises on PC
Exercises on PC
assessment methods
Qualifying examination
Qualifying examination
Composite examination (Written part + oral part)
Composite examination (Written part + oral part)
Preparation of a presentation
Preparation of a presentation
Recommended literature
  • DOUCEK, Petr, Luděk NOVÁK, Lea NEDOMOVÁ a Vlasta SVATÁ. Řízení bezpečnosti informací. Praha, 2011. ISBN 978-80-7431-050-8.
  • GÁLA, Libor, Jan POUR a Zuzana ŠEDIVÁ. Podniková informatika: počítačové aplikace v podnikové a mezipodnikové praxi.. Praha: Grada Publishing, 2015. ISBN 978-80-247-5457-4.
  • HOLOŠKA, Jiří. Umělá inteligence aplikovaná na kryptoanalýzu zaměřená na odhalování slabostí moderní kryptologie a počítačové bezpečnosti. Zlín, 2012. ISBN 978-80-7454-144-5.
  • JAŠEK, Roman; MALANÍK, David a DAŇKOVÁ, Nicol. Bezpečnost informačních systémů. Univerzita Tomáše Bati ve Zlíně, Fakulta aplikované informatiky. 2022.
  • KRAYEM, Said a Roman JAŠEK. Security of Information Systems. Tomas Bata University in Zli?n, 2015. ISBN 978-80-7454-8.
  • OULEHLA, Milan a Roman JAŠEK. Moderní kryptografie. Praha, 2017. ISBN 978-80-87383-67-4.
  • Petr Jirásek, Luděk Novák, Josef Požár. Výkladový slovník kybernetické bezpečnosti: Cyber security glossary. Praha, 2013. ISBN 978-80-7251-397-0.
  • PŘIBYL, Jiří a Jindřich KODL. Ochrana dat v informatice. Praha, 1996. ISBN 80-01-01664-1.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester