N_BIS Information System Security

University of Finance and Administration
Summer 2015
Extent and Intensity
2/0. 5 credit(s). Type of Completion: zk (examination).
Teacher(s)
RNDr. Petr Tesař, Ph.D. (lecturer)
Guaranteed by
doc. RNDr. Jan Lánský, Ph.D.
Department of Computer Science and Mathematics – Departments – University of Finance and Administration
Contact Person: Tamara Urbánková
Timetable of Seminar Groups
N_BIS/vAPH: Sat 28. 2. 9:45–11:15 S11, 11:30–13:00 S11, Fri 13. 3. 15:30–17:00 S11, Fri 27. 3. 15:30–17:00 S23, 17:15–18:45 S23, P. Tesař
Prerequisites
There are no prerequisites for this course.
Course Enrolment Limitations
The course is offered to students of any study field.
Course objectives
After completing the course the student will be able to handle basic theory , legislative framework and practical approaches protection of information in information systems of the organizations. He will also have an idea about resources applicable for cryptographic protection of the information .
Syllabus
  • 1 Fundamentals of IS security - definition of basic terms, why deal with security, how to deal with safety, security features, security mechanisms, security policies. 2 Legislative framework - the classification of sensitive information, the Act on the Protection of Classified Information and Security, the Law on Personal Data Protection, the Law on Electronic Communications, the Commercial Code, the Act on Undertaking on the Capital Market, Law on electronic signature, Cybernetic security Act. 3 Standards in the field of Information Systems I - Family ISO 27k,. 4 Standards in the field of Information Systems II - ISO 13335, ISO 15408. ISO 9000, ISO 21827, PAS56, COBIT, ITIL 5 Information Security Management System I - security management, ISMS, PDCA cycle, documentation. 6 Information Security Management System II - risk analysis, audit ISMS. 7 Information Security Management System III - personnel security, physical security, information system security, crisis management. 8 Principles of cryptography - basic definitions, history, classical ciphers, Shannon cipher security theory, complexity classes, primes in cryptology, generation of random bits. 9 Symmetric cryptography - definition, linear feedback shift register, substitution boxes (S-boxes), stream ciphers, block ciphers, DES, AES, Block cipher modes of operation. 10 Asymmetric cryptography - Overview, Diffie-Helmann protocol, RSA, ElGamal, Elliptic curve. 11 Hash algorithms and PKI - definition and use of the hash algorithms, MD5, SHA class - x, the structure of PKI, electronic signature. 12 Microsoft and cryptography - a server operating system, OS MS Windows Workstation, MS Office, True Crypt.
Literature
  • P.Hanáček, J.Staudek : Bezpečnost informačních systémů, ÚSIS Praha, 2000 J.Přibyl, J.Kodl : Ochrana dat v informatice, Vydavatelství ČVUT, A.J.Menezes, P.C. van Oorschot, S.A.Vanstone : Handbook of Applied Cryptography, CRC Press, 1996,
Teaching methods
Lectures and seminars in full-time study; tutorials in part-time study; compulsory seminar participation is 75% in full-time study, compulsory tutorial participation is 50% in part-time study.
Assessment methods
The exam is verbal, consists of two questions. The set of questions covers the whole range of lecture.
Language of instruction
Czech
Further comments (probably available only in Czech)
The course can also be completed outside the examination period.
Information on the extent and intensity of the course: 10 hodin KS/semestr.
The course is also listed under the following terms Summer 2008, Summer 2009, Summer 2010, Summer 2011, summer 2012, Summer 2013, Summer 2014, Summer 2016, Summer 2017, Summer 2018, Summer 2019, Summer 2020, Summer 2021, Summer 2022, Summer 2023, Summer 2024.
  • Enrolment Statistics (Summer 2015, recent)
  • Permalink: https://is.vsfs.cz/course/vsfs/summer2015/N_BIS