Lecturer(s)
|
|
Course content
|
The subject includes topics: - The basic conceptual apparatus of the Cyber Act for the study of cyber security. - History and present in the field of cyber threats. - Cyber warfare. - Hybrid threats in the context of cyber security. - Framework possibilities of using the theory and application of attack diagnostics to increase the cyber security of systems. - Possibilities of applying the recovery theory in the processes of active cyber security of systems. - Use of operational research methods to optimize cyber security from the point of view of logistics, process engineering, risk and crisis management of systems. - Procedures for ensuring the cyber security of entities falling under the Cyber Security Act. - Procedures for ensuring cyber security of entities in accordance with a series of ISO/IEC 27000 standards. - Risk analysis in the context of cyber security. - Modeling cyber threat scenarios. - Security management in the processes of cyber attacks and data protection (status space of the automated management system). - Possibilities of using internet tools and their cyber security in the area of logistics and crisis management systems. - Principles of secure information transfer in information systems.
|
Learning activities and teaching methods
|
Lecturing, Individual work of students, E-learning
- Term paper
- 20 hours per semester
- Participation in classes
- 56 hours per semester
- Preparation for course credit
- 10 hours per semester
- Preparation for examination
- 20 hours per semester
|
prerequisite |
---|
Knowledge |
---|
Education qualification of the successful mastered subject is systematic preparation and study prescribed and recommended literature. |
Education qualification of the successful mastered subject is systematic preparation and study prescribed and recommended literature. |
learning outcomes |
---|
Describe the legislative anchoring of cyber security |
Describe the legislative anchoring of cyber security |
Describe cybersecurity risk management processes |
Describe cybersecurity risk management processes |
Explain the role, purpose and content of the current directive of the Information Security Management System |
Explain the role, purpose and content of the current directive of the Information Security Management System |
Characterize current threats in cyberspace |
Characterize current threats in cyberspace |
Define modern approaches to increase the level of cyber security of the entity |
Define modern approaches to increase the level of cyber security of the entity |
Skills |
---|
Identify the cyber assets of the selected entity |
Identify the cyber assets of the selected entity |
Identify cyber threats in the selected entity |
Identify cyber threats in the selected entity |
Conduct an entity cyber security risk analysis |
Conduct an entity cyber security risk analysis |
To propose measures to improve the current state of cyber security of the subject |
To propose measures to improve the current state of cyber security of the subject |
Specify the possible scenarios of breaching the subject's cyber security |
Specify the possible scenarios of breaching the subject's cyber security |
teaching methods |
---|
Knowledge |
---|
Individual work of students |
Individual work of students |
Lecturing |
Lecturing |
E-learning |
E-learning |
assessment methods |
---|
Written examination |
Written examination |
Oral examination |
Oral examination |
Analysis of seminar paper |
Analysis of seminar paper |
Recommended literature
|
-
Basl, Josef a Blažíček, Roman. Podnikové informační systémy: podnik v informační společnosti. 2012. ISBN 978-80-247-4307-3.
-
Čapek Jan. Teoretické základy informatiky: distanční opora. 2013. ISBN 978-80-7395-574-8.
-
Čech, Ondřej. Nebezpečí kyberšikany: internet jako zbraň?. 2017. ISBN 978-80-904854-4-0.
-
Donát, Josef a Tomíšek, Jan. Právo v síti: průvodce právem na internetu. 2016. ISBN 978-80-7400-610-4.
-
Dunnigan, James F. Bojiště zítřka: tváří v tvář globální hrozbě kybernetického terorismu. 2004. ISBN 80-7214-642-4.
-
Harding, Luke. Akta Snowden: úplný příběh nejhledanějšího muže světa. 2017. ISBN 978-80-264-1595-4.
-
Jirovský, Václav. Kybernetická kriminalita: nejen o hackingu, crackingu, virech a trojských koních bez tajemství. 2007. ISBN 978-80-247-1561-2.
-
Kohout, Roman. Internetem bezpečně. 2017. ISBN 978-80-270-2440-7.
-
Kožíšek, Martin a Písecký, Václav. Bezpečně n@ internetu: průvodce chováním ve světě online. 2016. ISBN 978-80-247-5595-3.
-
Maisner, Martin. Zákon o kybernetické bezpečnosti: komentář. 2015. ISBN 978-80-7478-817-8.
-
Smejkal, Vladimír. Kybernetická kriminalita. 2015. ISBN 978-80-7380-501-2.
-
Stowell, Louie. Bezpečně online. 2017. ISBN 978-80-256-2083-0.
|