Lecturer(s)
|
-
Svoboda Petr, Ing. Ph.D.
-
Valášek Pavel, Ing.
|
Course content
|
The subject covers topics: - Security definition. - Systems theory. - Model theory and modeling. - Cybernetics and Informatics. - Information and cyber security. - Defining cyberspace. - Modeling of cybernetic system and cyber security. - Cyber Attack, Defense and Security. - Possibilities of systemic recognition of aggressive cyberspace. - Resources of the world about the modern concept of information and cyber security. - Information and cybernetic systems protection and modeling and simulation capabilities. - Development and use of new cybernetics and their security. - Cyber Security Project Solution by Modeling (CAD and others). - Summary of subject matter and consultation.
|
Learning activities and teaching methods
|
Lecturing, Exercises on PC, Practice exercises
- Preparation for course credit
- 8 hours per semester
- Participation in classes
- 40 hours per semester
|
prerequisite |
---|
Knowledge |
---|
- |
- |
learning outcomes |
---|
Characterize the content and context of the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti) |
Characterize the content and context of the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti) |
Define basic terms in the field of cyber security |
Define basic terms in the field of cyber security |
Specify examples of historical cyber security incidents |
Specify examples of historical cyber security incidents |
Discuss the issue of systems theory |
Discuss the issue of systems theory |
Discuss the issue of theoretical cybernetics |
Discuss the issue of theoretical cybernetics |
Skills |
---|
Prepare an instrumental and descriptive case study |
Prepare an instrumental and descriptive case study |
Identify the theoretical aspects in a real cyber security incident |
Identify the theoretical aspects in a real cyber security incident |
Assess the entity's obligations under the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti) |
Assess the entity's obligations under the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti) |
Identify the protected interests of the subject in the field of cyber security and possible vulnerabilities |
Identify the protected interests of the subject in the field of cyber security and possible vulnerabilities |
To propose procedures to increase the cyber security of the subject |
To propose procedures to increase the cyber security of the subject |
teaching methods |
---|
Knowledge |
---|
Exercises on PC |
Exercises on PC |
Practice exercises |
Practice exercises |
Lecturing |
Lecturing |
assessment methods |
---|
Analysis of the student's performance |
Analysis of the student's performance |
Recommended literature
|
-
Čapek Jan. Teoretické základy informatiky: distanční opora. 2013. ISBN 978-80-7395-574-8.
-
Čech, Ondřej. Nebezpečí kyberšikany: internet jako zbraň?. 2017. ISBN 978-80-904854-4-0.
-
Glenny, Misha. Temný trh: kyberzloději, kyberpolicisté a vy. 2013. ISBN 978-80-7363-522-0.
-
Heickerö, Roland. The dark sides of the Internet: on cyber threats and information warfare. 2013. ISBN 978-3-631-62478-4.
-
Hrůza, Petr. Kybernetická bezpečnost. 2012. ISBN 978-80-7231-914-5.
-
Kohout, Roman. Internetem bezpečně. 2017. ISBN 978-80-270-2440-7.
-
Kožíšek, Martin a Písecký, Václav. Bezpečně n@ internetu: průvodce chováním ve světě online. 2016. ISBN 978-80-247-5595-3.
-
Maisner, Martin. Zákon o kybernetické bezpečnosti: komentář. 2015. ISBN 978-80-7478-817-8.
-
Smejkal, Vladimír. Kybernetická kriminalita. 2015. ISBN 978-80-7380-501-2.
-
Stowell, Louie. Bezpečně online. 2017. ISBN 978-80-256-2083-0.
|