UIMOIBP022 Security and Data Analysis

Faculty of Philosophy and Science in Opava
Winter 2024
Extent and Intensity
0/2/0. 2 credit(s). Type of Completion: z (credit).
Teacher(s)
Ing. Vladimír Lazecký (seminar tutor)
RNDr. Šárka Vavrečková, Ph.D. (seminar tutor)
Guaranteed by
RNDr. Šárka Vavrečková, Ph.D.
Institute of Computer Science – Faculty of Philosophy and Science in Opava
Timetable of Seminar Groups
UIMOIBP022/A: Mon 11:40–12:25 B3a; and Thu 10. 10. 13:55–17:10 B3a, Thu 24. 10. 13:55–17:10 B3a, Thu 7. 11. 13:55–17:10 B3a, V. Lazecký, Š. Vavrečková
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Course objectives
The course is focused on secure methods of data acquisition and analysis. Students will learn methods used for data recovery not available in common ways, and also methods used in forensic analysis in non-destructive data acquisition for use in evidence proceedings.
Students will be acquainted with tools for data acquisition from storage media, their subsequent analysis and obtaining other relevant information from operating system and selected applications. Windows and Linux tools and live Linux distributions for this purpose will be discussed.
Learning outcomes
Students will be able to:
- apply data recovery procedures unavailable by conventional means;
- use the methods of forensic analysis for non-destructive data acquisition for use in evidence;
- use tools to retrieve data from storage media;
understands methods and resources for securing some devices, social networks and other Internet services, including encryption.
Syllabus
  • 1. Introduction to forensic science. Cybercrime, security teams, forensic investigation, legislation.
  • 2.-3. Information from public sources, OSINT.
  • 4. Tools for analyzing data in various operating systems. Connecting a disk to a remote computer via adapter. Possibilities of obtaining a disk image (ISO) and its analysis, hidden areas on the disk.
  • 5. Specialized distributions and applications intended for security purposes.
  • 6.-7. Introduction to cryptography. Encryption algorithms, data integrity.
  • 8.-9. Cryptography in practice. Digital signature, certificate, PKI. Data protection on storage media, secure authentication, data protection on Internet.
  • 10.-11. Personal security.
  • 12.-13. Network communication security. E-mail structure. Vulnerability databases, CVE and CWE records, OVAL. Detection of security problems in the network. Network monitoring.
Literature
    required literature
  • VAVREČKOVÁ, Šárka. Analýza dat: Úvod do digitální forenzní analýzy a metod ochrany dat. Slezská univerzita v Opavě, 2024 (skripta jsou průběžně aktualizována), 180 s.
    recommended literature
  • FRUHLINGER, Josh; SHARMA, Ax a BREEDEN, John. 15 top open-source intelligence tools. Online. CS Online. 2023.
  • ŠKOP, Miroslav. Biometrické systémy a jejich slabá místa. Online. TZB Info. Dostupné z: https://www.tzb-info.cz/bezpecnost/20337-biometricke-systemy-a-jejich-slaba-mista.
  • SOOD, Aditya K. Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks. 2. ilustrované vydání. Mercury Learning and Information, 2023. ISBN 9781501518027.
  • OSINT Framework [online]. Dostupné na: https://osintframework.com/
  • KOLOUCH, Jan a BAŠTA, Pavel. CyberSecurity. CZ.NIC. Praha: CZ.NIC, z.s.p.o., 2019. ISBN 978-80-88168-31-7. Dostupné také z: https://knihy.nic.cz/files/edice/cybersecurity.pdf.
  • LYLE, D. P. Forensics for dummies. 2nd edition. John Wile, 2016. ISBN 978-111-9181-682. URL info
  • MARAS, Marie-Helen. Computer forensics: cybercriminals, laws, and evidence. 2nd ed. Burlington, USA: Jones & Bartlett Publishers, 2014. ISBN 978-1-4496-9222-3. info
  • SANDERS, Chris. Analýza sítí a řešení problémů v programu Wireshark. 1. vyd. Brno: Computer Press, 2012. ISBN 978-80-251-3718-5. info
  • MOZAYANI, Ashraf a Carla NOZIGLIA. The forensic laboratory handbook: procedures and practice. 2nd ed. New York, N.Y.: Humana Press, 2011. ISBN 16-076-1872-9. info
  • Jirovský, Václav. Kybernetická kriminalita: nejen o hackingu, crackingu, virech a trojských koních bez tajemství. Praha: Grada, 2007. ISBN 978-80-247-1561-2. URL info
Teaching methods
Interactive lessons
Tutorials in computer class
Assessment methods
Compulsory active participation in seminars min. 75 %.
Seminar work on a chosen topic.
Language of instruction
Czech
Further Comments
Study Materials
The course can also be completed outside the examination period.
The course is also listed under the following terms Winter 2020, Winter 2021, Winter 2022, Winter 2023.
  • Enrolment Statistics (recent)
  • Permalink: https://is.slu.cz/course/fpf/winter2024/UIMOIBP022