115-0380/01 – Protection and Data Security of Information (BOI-MG)
Gurantor department | Department of Management | Credits | 2 |
Subject guarantor | Ing. Martin Drastich, Ph.D., MBA | Subject version guarantor | Ing. Martin Drastich, Ph.D., MBA |
Study level | undergraduate or graduate | Requirement | Choice-compulsory |
Year | 3 | Semester | summer |
| | Study language | Czech |
Year of introduction | 2005/2006 | Year of cancellation | 2010/2011 |
Intended for the faculties | EKF | Intended for study types | Bachelor |
Subject aims expressed by acquired skills and competences
Target of subject is, to student gained basic survey in the area safeness in
informative technology. Introduce with actual state safeness in Czech firm.
Orientation in the area personal, administrative, object, technical,
information system and cryptography encryption. Security information in terms
of law. Safeness in computer rush, digital signature, e-commerce, security
harrow, backup, antivirus program.
Teaching methods
Summary
Aktuální stav bezpečnosti a ochrany dat v českých firmách
Příčiny a důvody úniků, ztrát
Budování systému ochrany informací
Fyzická (technická) bezpečnost
Režimová ochrana
Personální ochrana
Hardwarová ochrana
Softwarová ochrana
Ochrana informací v sítích
Právní aspekty
Compulsory literature:
Recommended literature:
Way of continuous check of knowledge in the course of semester
E-learning
Other requirements
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Prerequisities
Subject has no prerequisities.
Co-requisities
Subject has no co-requisities.
Subject syllabus:
st Introduction to information technology security, basic concepts
2nd Current state of safety in Czech companies.
3rd The causes and reasons for losses, losses.
4th Building system security in information technology.
5th Physical (technical) safety.
6th Regime protection, personnel protection.
7th Hardware protection, software protection.
8th Network Security. Safety features and security in computer networks. Security of data transmission.
9th Cryptography. Cryptographic algorithms. Symmetric and asymmetric cryptography. Electronic signature.
10th Security features in computer networks: security gates, security protocols,
11th Security system: backup, resource protection, integrity checking, monitoring, virus protection.
12th To attack: intrusion detection, cleaning up after an attacker recovery operation, the measures against recurrence.
13th Security in information technology law.
14th Information security and regulatory standards. Classified information.
Conditions for subject completion
Occurrence in study plans
Occurrence in special blocks
Assessment of instruction
Předmět neobsahuje žádné hodnocení.