Lecturer(s)
|
|
Course content
|
Definition of safety. Systems theory. Model theory and modeling. Cybernetics and informatics. Information and cyber security. Defining cyberspace. Modeling of cybernetic system and cyber security. Cyber attack, defense and security. Possibilities of systematic recognition of aggressive cyberspace. World resources about the modern concept of information and cyber security. Protection of information and cybernetic systems and possibilities of modeling and simulations. Development and use of new means of cybernetics and their security. Solution of cyber security project by means of modeling (CAD and others). Summary of subject matter and tutorials.
|
Learning activities and teaching methods
|
- Home preparation for classes
- 34 hours per semester
- Preparation for course credit
- 10 hours per semester
- Participation in classes
- 42 hours per semester
- Term paper
- 14 hours per semester
- Preparation for examination
- 20 hours per semester
|
prerequisite |
---|
Knowledge |
---|
Basic knowledge of information and communication technologies. Basics of work with personal computer, mobile devices and internet. |
Basic knowledge of information and communication technologies. Basics of work with personal computer, mobile devices and internet. |
learning outcomes |
---|
Characterize the content and context of the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti) |
Characterize the content and context of the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti) |
Define basic terms in the field of cyber security |
Define basic terms in the field of cyber security |
Specify examples of historical cyber security incidents |
Specify examples of historical cyber security incidents |
Discuss the issue of systems theory |
Discuss the issue of systems theory |
Discuss the issue of theoretical cybernetics |
Discuss the issue of theoretical cybernetics |
Skills |
---|
Prepare an instrumental and descriptive case study |
Prepare an instrumental and descriptive case study |
Identify the theoretical aspects in a real cyber security incident |
Identify the theoretical aspects in a real cyber security incident |
Assess the entity's obligations under the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti) |
Assess the entity's obligations under the Czech Cyber Security Act (Zákon o kybernetické bezpečnosti) |
Identify the protected interests of the subject in the field of cyber security and possible vulnerabilities |
Identify the protected interests of the subject in the field of cyber security and possible vulnerabilities |
To propose procedures to increase the cyber security of the subject |
To propose procedures to increase the cyber security of the subject |
teaching methods |
---|
Knowledge |
---|
Exercises on PC |
Exercises on PC |
Dialogic (Discussion, conversation, brainstorming) |
Dialogic (Discussion, conversation, brainstorming) |
Monologic (Exposition, lecture, briefing) |
Monologic (Exposition, lecture, briefing) |
Practice exercises |
Practice exercises |
Lecturing |
Lecturing |
Teamwork |
Teamwork |
assessment methods |
---|
Didactic test |
Didactic test |
Essay |
Essay |
Conversation |
Conversation |
Workplace supervision |
Workplace supervision |
Oral examination |
Oral examination |
Preparation of a presentation |
Preparation of a presentation |
Recommended literature
|
-
SVOBODNÝ PŘÍSTUP K INFORMACÍM : informatika, služby vytvářející důvěru, elektronické komunikace, egovernment, elektronické úkony a konverze dokumentů, informační systémy veřejné správy, kybernetická bezpečnost, základní registry, elektronická identifikace (od 1.7.2018) ; redakční uzávěrka 4.9.2017. Ostrava, 2017. ISBN 978-80-7488-244-9.
-
Čapek Jan. Teoretické základy informatiky: distanční opora. 2013. ISBN 978-80-7395-574-8.
-
GLENNY, Misha. Temný trh: kyberzloději, kyberpolicisté a vy.. Praha, 2013. ISBN 978-80-7363-522-0.
-
HRŮZA, Petr. Kybernetická bezpečnost. Brno, 2012. ISBN 978-80-7231-914-5.
-
J. Dvořák a kol. Kybernetická bezpečnost jako součást kyberprostoru moderní znalostní společnosti. Brno, 2017.
-
J. Dvořák a kol. Modelling of Processes of Logistics in Cyberspace Security. 2017.
-
Louie Stowell. Bezpečně online. Praha, 2017. ISBN 978-80-256-2083-0.
-
MAISNER, Martin. Zákon o kybernetické bezpečnosti: komentář.. Praha, 2015. ISBN 978-80-7478-817-8.
-
Martin Kožíšek. Bezpečně n@ internetu: průvodce chováním ve světě online. Praha, 2016. ISBN 978-80-247-5595-3.
-
O. Čech. Nebezpečí kyberšikany : internet jako zbraň?. České Budějovice, 2017. ISBN 978-80-904854-4-0.
-
Petr Hrůza a kol. Kybernetická bezpečnost II. Brno, 2013. ISBN 978-80-7231-931-2.
-
Roland Heickero. The dark sides of the Internet: on cyber threats and information warfare. Frankfurt, 2013. ISBN 978-3-631-62478-4.
-
Roman Kohout, Sandra Kubíčková. Internetem bezpečně. Karlovy Vary, 2017. ISBN 978-80-270-1148-3.
-
Vladimír Smejkal. Kybernetická kriminalita. Plzeň, 2015. ISBN 978-80-7380-501-2.
|