Security of Data and IT Systems 510-IS2-2BDSI-22
Profile of studies: general-academic
Form of study: full-time
Type of subject: obligatory
Domain: exact and natural sciences, discipline: Information technology
Year of study / semester: 2/3
Prerequisites (so-called sequential system of classes and exams): none
Lecture: 15 Laboratory: 30
Teaching methods: lecture, laboratory
ECTS credits: 4
Balance of student workload:
Participation in classes:
- lecture 15h
- laboratory 30h
Getting to know the literature: 10h
Preparation for the colloquium: 10h
Preparation for the exam: 10h
Duration of the exam: 1h
Design tasks implemented at home: 10h
Participation in consultations: 14h
Quantitative indicators:
requiring direct teacher participation: 60h, 2,4 ECTS
not requiring direct teacher participation: : 40h, 1,6 ECTS
Type of course
Prerequisites (description)
Course coordinators
Learning outcomes
He knows the issues of security of digital data and information systems. He knows the threats for information systems in the context of confidentiality, integrity and availability of information. KP7_WG7, KP7_UW7, KP7_UW10, KP7_UW12
He knows the models and security classes of information systems. He knows the methods of user identification and authentication. He knows the basics of cryptography as well as modern data encryption standards . KP7_WG7, KP7_UW7, KP7_UW10, KP7_UW12
He knows issues related to data security in the context of the functioning of wired and wireless computer networks, in particular the Internet and mobile devices . KP7_WG7, KP7_UW7, KP7_UW7, KP7_UW10, KP7_UW12
Ge is able to assess and strengthen data security in various configurations of the most popular operating systems (Unix, MS Windows) with the practical use of: access control mechanisms (alike Discretionary Access Control), firewalls, anti-virus programs, user authentication (using knowledge, tokens and biometric methods) and encryption. KP7_WG7, KP7_UW7, KP7_UW7, KP7_UW10, KP7_UW12
Is able to analyze and strengthen data security in local networks, including configure small wireless networks with access control and encryption. KP7_WG7, KP7_UW7, KP7_UW7, KP7_UW10, KP7_UW12
Is able to assess security and protect data (in particular personal and financial) on the Internet. KP7_WG7, KP7_UW7, KP7_UW7, KP7_UW10
He understands the role of data security and information systems for the functioning of modern society, is aware of the need to communicate to the public this knowledge and understands the role of unrestricted exchange of information in shaping social and political awareness. KP7_KR1
Assessment criteria
written exam (lecture), student monitoring and observation, programming projects
Bibliography
John R. Vacca, Network and System Security
David Kim and Michael G. Solomon, Fundamentals Of Information Systems Security (Information Systems Security & Assurance)
Mark Stamp, Information Security: Principles and Practice
Additional information
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: