Nov 22, 2019   10:12 p.m.      Cecília        
University information system

Course syllabus BIAX10033 - Information Security and Privacy (FI - WS 2019/2020)


     Information sheet          


     Slovak          English          


University: Pan-european University
Faculty: Faculty of Informatics
Course unit code: BIAX10033
Course unit title: Information Security and Privacy
Planned learning activities and teaching methods:
lecture3 hours weekly / 30 hours per semester of study (on-site method)

Credits allocated: 5
Recommended semester/trimester: 3.
 
Level of study: 1.
Prerequisites for registration: none
 
Assessment methods:
Students must obtain at least 20 points from total of 40 points(control tests, homework) during the semester to be allowed to take an exam. Student can obtain 60 points for the exam. The grade A is obtained for 94-100 points, B for 86-93 points, C for 76-85 points, D for 66-75 points, E for 56-65 points and FX for 0-55 points.
 
Learning outcomes of the course unit:
The goal of the course is to educate the students about the basic principles of information security. To acquaint them with basic security mechanisms and with basic principles they use. To educate the students about basics of protection of personal data. To understand the need of a systematic approach to creation, management and evaluation of the security of information systems.
 
Course contents:
Introduction to information security:
- motivation, basic terminology, overview of legislation

Basics of ciphering and deciphering, cipher systems with private and public keys:
- Symmetric ciphers
- Asymmetric ciphers
- Data integrity algorithms
- Digital signatures, PKI
- Key management and distribution

Physical security, identification and autentication, network security specifics:
- User authentication protocols
- RM OSI network model, specifics of the implementation of security mechanisms on different layers of RM OSI model, firewalls

Standardization, protection of personal data:
- Electronic mail security, social networks and personal data

Information systems and the need of a systematic approach to creation, management and evaluation of the security of IS.
 
Recommended or required reading:
Recommended:
Daniela CHUDÁ:. Bezpečnosť a ochrana IS. 1. vyd. Košice : Equilibria, 2013. 116 s. ISBN 978-80-7143-102-9.
Eliška OBCHODNÍKOVÁ: Matematické základy kryptografických algoritmov, VSB Technicky univerzita Ostrava, Zapadočeská univerzita v Plzni, http://mi21.vsb.cz/modul/matematicke-zaklady-kryptografickych-algoritmu
ISO/IEC TR 13335 Information technology. Guidelines for the management of IT security. Techniques for the management of IT security
ISO/IEC 15408 Information technology — Security techniques — Evaluation criteria for IT security
ISO/IEC 27001 Information technology. Security techniques. Information security management systems.
Martin STANEK: KRYPTOLÓFIA. ZÁKLADY. VERZIA 1, JANUÁR 2015, HTTP://WWW.DCS.FMPH.UNIBA.SK/~STANEK/KRYPTOLOGIA_V1.PDF, CC BY-NC-ND 4.0
Ondrej STRNÁD: Bezpečnosť a manažment informačných systémov. STU v Bratislave FIIT, 2009. 344 s. ISBN 978-80-227-3040-2
Ondrej STRNÁD: Manažment bezpečnosti IT. Bratislava : STU v Bratislave, 2002. 211 s. ISBN 80-227-1696-0
Renata JANOŠCOVÁ: Princípy informačnej bezpečnosti, 2014 , DOI 10.13140/RG.2.1.3361.7683, Publisher: Trenčín : Vysoká škola manažmentu v Trenčíne
Tipton, H., & Krause, M. 2007. Information security management handbook (6th ed.). Boca Raton, FL: Auerbach. ISBN: 9781420067088

 
Language of instruction: Slovak, English
 
Notes:
 
Courses evaluation:
Assessed students in total: 340

ABCDEFX
10,3 %20,0 %23,5 %25,3 %20,9 %0 %
 
Name of lecturer(s): Ing. Ivana Budinská, PhD. (examiner, instructor, lecturer)
doc. RNDr. Eugen Ružický, CSc. (lecturer, person responsible for course)
Last modification: 29. 10. 2019
Supervisor: doc. RNDr. Eugen Ružický, CSc.


Last modification made by Ján Lukáš on 10/29/2019.

Type of output: