Lecturer(s)
|
-
Svoboda Petr, Ing. Ph.D.
-
Pavlík Lukáš, Ing. Ph.D.
|
Course content
|
1. Basic conceptual framework of the Cyber Security Act. 2. History and present in the field of cyber threats. 3. Cyber warfare. 4. Hybrid threats in the context of cyber security. 5. Procedures for ensuring the cyber security of entities falling under the Cyber Security Act. 6. Procedures for ensuring cyber security of entities in accordance with a series of ISO/IEC 27000 standards. 7. Risk analysis in the context of cyber security. 8. Modeling cyber threat scenarios. 9. Principles of secure information transfer in information systems. 10. Cyber security of production processes and industrial systems. 11. Cyber security in terms of computer security. 12. Possibilities of using internet tools and their cyber security in the area of logistics and crisis management systems. 13. Current challenges in the field of cyber security (remote work, Mobile Device Management, Bring Your Own Device and others).
|
Learning activities and teaching methods
|
- Term paper
- 28 hours per semester
- Participation in classes
- 52 hours per semester
- Preparation for course credit
- 20 hours per semester
- Preparation for examination
- 25 hours per semester
|
learning outcomes |
---|
Knowledge |
---|
Describe the legislative anchoring of cyber security |
Describe the legislative anchoring of cyber security |
Describe cybersecurity risk management processes |
Describe cybersecurity risk management processes |
Explain the role, purpose and content of the current directive of the Information Security Management System |
Explain the role, purpose and content of the current directive of the Information Security Management System |
Characterize current threats in cyberspace |
Characterize current threats in cyberspace |
Define modern approaches to increase the level of cyber security of the entity |
Define modern approaches to increase the level of cyber security of the entity |
Skills |
---|
Identify the cyber assets of the selected entity |
Identify the cyber assets of the selected entity |
Identify cyber threats in the selected entity |
Identify cyber threats in the selected entity |
Conduct an entity cyber security risk analysis |
Conduct an entity cyber security risk analysis |
To propose measures to improve the current state of cyber security of the subject |
To propose measures to improve the current state of cyber security of the subject |
Specify the possible scenarios of breaching the subject's cyber security |
Specify the possible scenarios of breaching the subject's cyber security |
teaching methods |
---|
Knowledge |
---|
E-learning |
E-learning |
Individual work of students |
Individual work of students |
Lecturing |
Lecturing |
assessment methods |
---|
Analysis of seminar paper |
Analysis of seminar paper |
Written examination |
Written examination |
Oral examination |
Oral examination |
Recommended literature
|
-
BROOKS, Charles et al. Cybersecurity Essentials. John Wiley, 2018. ISBN 978-1-119-36239-5.
-
DOUCEK, Petr, Martin KONEČNÝ a Luděk NOVÁK. Řízení kybernetické bezpečnosti a bezpečnosti informací. Praha, 2019. ISBN 978-80-88260-39-4.
-
EVANS, Lester. Cybersecurity: What You Need to Know About Computer and CyberSecurity, Social Engineering, The Internet of Things + An Essential Guide to Ethical Hacking for Beginners. USA, 2019. ISBN 9781794647237.
-
JOHNSON, Thomas A. Cybersecurity: Protecting Critical Infrastructers from Cyber Attack and Cyber Warfare. 6000 Broken Sound Parkway NW, Suite 300, 2015. ISBN 978-1-4822-3923-2.
-
KOLOUCH, Jan a Pavel BAŠTA. CyberSecurity. Praha, 2019. ISBN 978-80-88168-31-7.
-
KOLOUCH, Jan. CyberCrime. Praha, 2016. ISBN 978-80-88168-15-7.
-
SHICK, Nina. Deep Fakes and the Infocalypse: What You Urgently Need To Know. Monoray, 2020. ISBN 978-1913183523.
-
SMEJKAL, Vladimír, Tomáš SOKOL a Jindřich KODL. Bezpečnost informačních systémů podle zákona o kybernetické bezpečnosti. Plzeň, 2019. ISBN 978-80-7380-765-8.
|