Faculty of Information Technology, BUT

Course details

Information System Security

BIS Acad. year 2017/2018 Winter semester 5 credits

The course aims to the security goals, security functions, and security mechanisms. The content is: Introduction into information security, basic terms, threats, weak points, security measures, criteria for system security assessment, Common Criteria, data transmission security, operating system and database security, malicious software,  role of cryptography.

Guarantor

Language of instruction

Czech

Completion

Credit+Examination (written)

Time span

39 hrs lectures, 13 hrs projects

Assessment points

70 exam, 15 half-term test, 15 projects

Department

Lecturer

Instructor

Aron Lukáš, Ing., Ph.D. (DITS FIT BUT)
Barabas Maroš, Ing., Ph.D. (DITS FIT BUT)
Breitenbacher Dominik, Ing. (DITS FIT BUT)
Hujňák Ondřej, Ing. (DITS FIT BUT)
Kačic Matej, Ing., Ph.D. (DITS FIT BUT)
Malinka Kamil, Mgr., Ph.D. (DITS FIT BUT)
Mazura František, Ing. (DITS FIT BUT)
Očenáš Martin, Ing. (DITS FIT BUT)
Smetka Tomáš, Ing. (DITS FIT BUT)

Subject specific learning outcomes and competences

Students will learn basic principles of information systems security. They will learn also terminology, basic security goals, functions, and mechanisms.

Learning objectives

The goal is to make students familiar with the basic concepts of information systems security.

Study literature

  • Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW

Fundamental literature

  • Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0

Syllabus of lectures

  • Introduction
  • Threats, vulnerabilities
  • Security measures
  • Criteria for system security assessment
  • Common criteria (CC)
  • Security functions
  • Risk analysis
  • Data transmission security
  • Operating system security
  • Database security
  • Web security
  • Smart card applications
  • Role of cryptography

Syllabus - others, projects and individual work of students

  1. A homework on security mechanisms.
  2. A homework on applied cryptography.

Progress assessment

A mid-term exam evaluation and an evaluation of projects.

Exam prerequisites

To obtain at least one point in each project.

Course inclusion in study plans

  • Programme IT-MSC-2, field MBI, any year of study, Compulsory-Elective group O
  • Programme IT-MSC-2, field MBS, MIS, any year of study, Compulsory
  • Programme IT-MSC-2, field MGM, MMI, any year of study, Elective
  • Programme IT-MSC-2, field MIN, MMM, any year of study, Compulsory-Elective group B
  • Programme IT-MSC-2, field MPV, any year of study, Compulsory-Elective group D
  • Programme IT-MSC-2, field MSK, 2nd year of study, Compulsory
Back to top