Lecturer(s)
|
-
Ševčík Pavel, Ing.
-
Kincl Jan, Ing.
-
Dorotík Ladislav, Ing.
-
Jašek Roman, prof. Mgr. Ph.D., DBA
-
Rei Ester, Ing.
|
Course content
|
The aim of the course is to acquaint students with the key technologies of data security and to present the areas of their application in close connection with the field of study. Topics: 1. Introduction to data security technologies 2. Cybersecurity Act and implementing regulations 3. Symmetric and asymmetric cryptography 4. Electronic signature technology and its complete scheme 5. Server and web certificates 6. SSL and TLS 5. Disk arrays and smart data storage 7. Information Security Management System (ISMS) 8. Blockchain technologies 9. Data backup and archiving 9. GDPR 10. NIS2 11. eIDAS 12. Whistleblower Law 13. Penetration tests 14. Case studies
|
Learning activities and teaching methods
|
Lecturing, Exercises on PC
- Participation in classes
- 48 hours per semester
- Home preparation for classes
- 50 hours per semester
- Preparation for course credit
- 10 hours per semester
- Preparation for examination
- 10 hours per semester
- Educational trip
- 0 hours per semester
- Term paper
- 15 hours per semester
- Participation in classes
- 18 hours per semester
|
prerequisite |
---|
Knowledge |
---|
Successful completion of subjects related to the theoretical foundations of computer science. |
Successful completion of subjects related to the theoretical foundations of computer science. |
learning outcomes |
---|
describe the organization's information security management system |
describe the organization's information security management system |
define the meaning of the GDPR general regulation |
define the meaning of the GDPR general regulation |
explain the principle of asymmetric cryptography |
explain the principle of asymmetric cryptography |
draw and explain the scheme of an electronic signature |
draw and explain the scheme of an electronic signature |
describe industrial blockchain technology |
describe industrial blockchain technology |
Skills |
---|
draft the organization's security policy design a strong password and verify its strength choose disk array technology to ensure the continuity of their operation propose a way of backing up data and processes create a suitable hash print of any digital object |
draft the organization's security policy design a strong password and verify its strength choose disk array technology to ensure the continuity of their operation propose a way of backing up data and processes create a suitable hash print of any digital object |
teaching methods |
---|
Knowledge |
---|
Lecturing |
Exercises on PC |
Exercises on PC |
Lecturing |
assessment methods |
---|
Preparation of a presentation |
Preparation of a presentation |
Composite examination (Written part + oral part) |
Composite examination (Written part + oral part) |
Qualifying examination |
Qualifying examination |
Recommended literature
|
-
DOUCEK, Petr, Luděk NOVÁK, Lea NEDOMOVÁ a Vlasta SVATÁ. Řízení bezpečnosti informací. Praha, 2011. ISBN 978-80-7431-050-8.
-
GÁLA, Libor, Jan POUR a Zuzana ŠEDIVÁ. Podniková informatika: počítačové aplikace v podnikové a mezipodnikové praxi.. Praha: Grada Publishing, 2015. ISBN 978-80-247-5457-4.
-
HOLOŠKA, Jiří. Umělá inteligence aplikovaná na kryptoanalýzu zaměřená na odhalování slabostí moderní kryptologie a počítačové bezpečnosti. Zlín, 2012. ISBN 978-80-7454-144-5.
-
JAŠEK, Roman; MALANÍK, David a DAŇKOVÁ, Nicol. Bezpečnost informačních systémů. Univerzita Tomáše Bati ve Zlíně, Fakulta aplikované informatiky. 2022.
-
KRAYEM, Said a Roman JAŠEK. Security of Information Systems. Tomas Bata University in Zli?n, 2015. ISBN 978-80-7454-8.
-
OULEHLA, Milan a Roman JAŠEK. Moderní kryptografie. Praha, 2017. ISBN 978-80-87383-67-4.
-
Petr Jirásek, Luděk Novák, Josef Požár. Výkladový slovník kybernetické bezpečnosti: Cyber security glossary. Praha, 2013. ISBN 978-80-7251-397-0.
-
PŘIBYL, Jiří a Jindřich KODL. Ochrana dat v informatice. Praha, 1996. ISBN 80-01-01664-1.
|