050-0510/04 – Computer Network and Data Protection (PSaOchr)
Gurantor department | Department of Civil Protection | Credits | 4 |
Subject guarantor | doc. Ing. Pavel Šenovský, Ph.D. | Subject version guarantor | doc. Ing. Pavel Šenovský, Ph.D. |
Study level | undergraduate or graduate | Requirement | Choice-compulsory type B |
Year | 3 | Semester | winter |
| | Study language | Czech |
Year of introduction | 2020/2021 | Year of cancellation | |
Intended for the faculties | FBI | Intended for study types | Bachelor |
Subject aims expressed by acquired skills and competences
The goal of the subject is to understand the work with the computer networks and methods of their protection. And further also to get the basic knowledge of the database systems.
Teaching methods
Lectures
Tutorials
Summary
Problematics of data protection in time of extensive usage of complex information systems cased to be a problem of the IT personnel, but needs to be addressed by much broader community of experts with varied specialization, including experts in general safety and security. During the course the students will learn about the most common techniques of system penetration and protection against it, including the basics of development of the IT security policies, compatible with ISO 27000 norms. The course is intended for future safety and security experts (non IT), to allow for effective communication with IT experts when coordinating safety and security measures between these professions, while protecting organization’s interests.
Compulsory literature:
Recommended literature:
Way of continuous check of knowledge in the course of semester
Develop semestrary project assigned by the teacher
E-learning
Other requirements
No other requirements on student
Prerequisities
Subject has no prerequisities.
Co-requisities
Subject has no co-requisities.
Subject syllabus:
1. Introduction to the course
2-3. Services of modern computer networks
4. Information security management system (ISMS)
5. Use case of ISMS
6. Identity management in computer network
7. Authentication and authorization methods
8. Techniques used by malware
9. Backup, disc cloning and RAID
10. Network perimeter and its protection
11. Human factor
12-13. Attack vectors
Conditions for subject completion
Occurrence in study plans
Occurrence in special blocks
Assessment of instruction
Předmět neobsahuje žádné hodnocení.