UIN3047 Trends in Computer Science

Faculty of Philosophy and Science in Opava
Winter 2020
Extent and Intensity
2/0/0. 4 credit(s). Type of Completion: zk (examination).
Teacher(s)
doc. Ing. Petr Sosík, Dr. (lecturer)
Guaranteed by
doc. Ing. Petr Sosík, Dr.
Institute of Computer Science – Faculty of Philosophy and Science in Opava
Timetable
each odd Monday 14:45–17:59 B2
Prerequisites (in Czech)
TYP_STUDIA(N)
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Course objectives
The course provides both basic introduction and a complex overview of information security, called also cybernetic security. After a profound explanation of basic principles of this quickly developing field, various approaches to the information protection will be analyzed, with emphasize on the level of information systems of public administration, in private companies and also at the government and state level.
Syllabus
  • 1. Fundamentals of the information security: what is information, properties and attributes, information security specifics. Elements of the security theory, what it is and what it is not, basic terms. A relation of information security to computer science. Approaches to the information security, practical examples, an overview of legal regulation and technical standards.
    2. A relation of information security to information processing systems: IS models, layers and infrastructure, the application layer, the service layer and their security aspects, micro IT x macro IT traffic, a list of professional categories and their processing tools, roles, relations, regulation x technological progress.
    3. Systematical management of information security: technical standards, legal requirements and standards, a structure of the information security management system. Integrated approach to the solution: not only IT, risk management, security strategy, security policies and directives, practical examples. Selected areas of security management: the management of continual processes, incident management, release management, identity management.
    4. A relation of technical and process security: pros and cons of both approaches, security design.
    5. Cybernetic security: security aspects of information systems over infrastructure of "large networks", security aspects of state assets protection. Security incidents: classification, incidents against privacy, accessibility and integrity of information, sociotechnical and technical incidents, possibilities of defense.
Literature
    required literature
  • Zákon č. 181/2014 Sb., o kybernetické bezpečnosti. Praha, 2014. info
  • ČSN ISO/IEC 27001, Informační technologie ? Bezpečnostní techniky ? Systém managementu bezpečnosti informací ? Požadavky. Praha, 2006. info
  • Doseděl, T. Počítačová bezpečnost a ochrana dat. Brno, Computer Press, 2004. info
    recommended literature
  • Stamp, M. Information Security: Principles and Practice. London, Wiley, 2011. info
Teaching methods
Interactive lecture
Lecture with a video analysis
Assessment methods
Individual project solving a particular case of information security
Language of instruction
Czech
Further comments (probably available only in Czech)
Study Materials
The course can also be completed outside the examination period.
Teacher's information
Class participation 70%, individual project assigned by the lecturer.
The course is also listed under the following terms Winter 1993, Winter 1994, Winter 1995, Winter 1996, Winter 1997, Winter 1998, Winter 1999, Winter 2000, Winter 2001, Winter 2002, Winter 2003, Winter 2004, Winter 2005, Winter 2006, Winter 2007, Winter 2008, Winter 2009, Winter 2010, Winter 2011, Winter 2012, Winter 2013, Winter 2014, Winter 2015, Winter 2016, Winter 2017, Winter 2018, Winter 2019, Winter 2021, Winter 2022.
  • Enrolment Statistics (Winter 2020, recent)
  • Permalink: https://is.slu.cz/course/fpf/winter2020/UIN3047