115-0380/01 – Protection and Data Security of Information (BOI-MG)

Gurantor departmentDepartment of ManagementCredits2
Subject guarantorIng. Martin Drastich, Ph.D., MBASubject version guarantorIng. Martin Drastich, Ph.D., MBA
Study levelundergraduate or graduate
Study languageCzech
Year of introduction2005/2006Year of cancellation2010/2011
Intended for the facultiesEKFIntended for study typesBachelor
Instruction secured by
LoginNameTuitorTeacher giving lectures
DRA15 Ing. Martin Drastich, Ph.D., MBA
Extent of instruction for forms of study
Form of studyWay of compl.Extent
Full-time Credit 2+0

Subject aims expressed by acquired skills and competences

Target of subject is, to student gained basic survey in the area safeness in informative technology. Introduce with actual state safeness in Czech firm. Orientation in the area personal, administrative, object, technical, information system and cryptography encryption. Security information in terms of law. Safeness in computer rush, digital signature, e-commerce, security harrow, backup, antivirus program.

Teaching methods

Summary

Aktuální stav bezpečnosti a ochrany dat v českých firmách Příčiny a důvody úniků, ztrát Budování systému ochrany informací Fyzická (technická) bezpečnost Režimová ochrana Personální ochrana Hardwarová ochrana Softwarová ochrana Ochrana informací v sítích Právní aspekty

Compulsory literature:

. Drucker, P. F. Výzvy managementu pro 21. století. Praha: Management Press, 2000. 187 str. ISBN 80-7261-021-x 2. Fotr, J. Jak hodnotit a snižovat podnikatelské riziko. Praha: Management Press, 1992. 105 str. ISBN 80-85603-06-3 3. Chevalier, A., Hirsch, G. Rizika podnikání. Praha: Victoria Publishing, 1982. 137 str. ISBN 80-85865-05-x 4. Látal, I., Štantejský, M. Bezpečnostní zásady ochrany podniku (Prevence a řešení krizových situací). Praha: Prospektrum, 2001. 119 str. ISBN 80-7175- 091-3 5. Rodryčová, D., Staša, P. Bezpečnost informací jako podmínka prosperity firmy. Praha: Grada, 2000.143 str. ISBN 80-7169-144-5 6. PricewaterhouseCoopers, Národní bezpečnostní úřad a časopis DSM - data security management: Průzkum stavu informační bezpečnosti 2007

Recommended literature:

1. Látal, I. a kol.: Ochrana informací, dat a počítačových systémů. Eurounion, s.r.o., Praha, 1996. 238 str. ISBN: 80-85858-32-0 2. Němec P. Public relations: Komunikace v konfliktních a krizových situacích. Praha: Management Press, 1999. 125 str. ISBN 80-85943-66-2 3. Umlaufová, M., Pfeifer, L. Prevence a řízení podnikatelské krize v aktuálním českém hospodářském prostředí. Praha: Victoria Publishing, 1995. 99 str. ISBN 80-85865-52-1 4. Umlaufová, M., Pfeifer, L. Prevence a řízení podnikatelské krize v aktuálním českém hospodářském prostředí. Praha: Victoria Publishing, 1995. 99 str. ISBN 80-85865-52-1 5. Kovacich, G.L.: Průvodce bezpečnostního pracovníka informačních systémů. Unis Publishing, Praha 2000, 200 str., ISBN 80-86097-42-0 6. Scambray, J.; McClure, S., Kurtz G.: Hacking bez tajemství. Computer Press, Praha 2002, 625 str., ISBN 80-7226-644-6 7. Doseděl, T.: Počítačová bezpečnost a ochrana dat. Computer press, Brno, 2004. 182 str.

Way of continuous check of knowledge in the course of semester

E-learning

Další požadavky na studenta

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Prerequisities

Subject has no prerequisities.

Co-requisities

Subject has no co-requisities.

Subject syllabus:

st Introduction to information technology security, basic concepts 2nd Current state of safety in Czech companies. 3rd The causes and reasons for losses, losses. 4th Building system security in information technology. 5th Physical (technical) safety. 6th Regime protection, personnel protection. 7th Hardware protection, software protection. 8th Network Security. Safety features and security in computer networks. Security of data transmission. 9th Cryptography. Cryptographic algorithms. Symmetric and asymmetric cryptography. Electronic signature. 10th Security features in computer networks: security gates, security protocols, 11th Security system: backup, resource protection, integrity checking, monitoring, virus protection. 12th To attack: intrusion detection, cleaning up after an attacker recovery operation, the measures against recurrence. 13th Security in information technology law. 14th Information security and regulatory standards. Classified information.

Conditions for subject completion

Full-time form (validity from: 2003/2004 Summer semester)
Task nameType of taskMax. number of points
(act. for subtasks)
Min. number of points
Exercises evaluation Credit 85  0
Mandatory attendence parzicipation:

Show history

Occurrence in study plans

Academic yearProgrammeField of studySpec.FormStudy language Tut. centreYearWSType of duty
2010/2011 (B6208) Economics and Management (6208R037) Management (00) Management P Czech Ostrava 2 Choice-compulsory study plan
2010/2011 (B6208) Economics and Management (6208R037) Management (00) Management P Czech Ostrava 3 Choice-compulsory study plan
2009/2010 (B6208) Economics and Management (6208R037) Management (00) Management P Czech Ostrava 2 Choice-compulsory study plan
2009/2010 (B6208) Economics and Management (6208R037) Management (00) Management P Czech Ostrava 3 Choice-compulsory study plan
2008/2009 (B6208) Economics and Management (6208R037) Management (00) Management P Czech Ostrava 2 Choice-compulsory study plan
2008/2009 (B6208) Economics and Management (6208R037) Management (00) Management P Czech Ostrava 3 Choice-compulsory study plan
2007/2008 (B6208) Economics and Management (6208R037) Management (00) Management P Czech Ostrava 2 Choice-compulsory study plan
2007/2008 (B6208) Economics and Management (6208R037) Management (00) Management P Czech Ostrava 3 Choice-compulsory study plan
2006/2007 (B6208) Economics and Management (6208R037) Management (00) Management P Czech Ostrava 2 Choice-compulsory study plan
2005/2006 (B6208) Economics and Management (6208R037) Management (00) Management P Czech Ostrava 3 Choice-compulsory study plan
2005/2006 (B6208) Economics and Management (6208R037) Management (05) Management P Czech Ostrava 3 Choice-compulsory study plan

Occurrence in special blocks

Block nameAcademic yearForm of studyStudy language YearWSType of blockBlock owner