Mar 29, 2020   1:48 p.m.      Miroslav        
University information system

Course syllabus BIAX10033 - Information Security and Privacy (FI - SS 2019/2020)


     Information sheet          


     Slovak          English          


University: Pan-european University
Faculty: Faculty of Informatics
Course unit code: BIAX10033
Course unit title: Information Security and Privacy
Planned learning activities and teaching methods:
lecture3 hours weekly / 30 hours per semester of study (on-site method)

Credits allocated: 5
Recommended semester/trimester: 3.
 
Level of study: 1.
Prerequisites for registration: none
 
Assessment methods:
Students must obtain at least 20 points from total of 40 points(written semestral project and its presentation) during the semester to be allowed to take an exam. Student can obtain 60 points for the exam. The grade A is obtained for 94-100 points, B for 86-93 points, C for 76-85 points, D for 66-75 points, E for 56-65 points and FX for 0-55 points.
 
Learning outcomes of the course unit:
The aim of the course is to acquire basic knowledge related to information security. To get acquainted with the basic security mechanisms and to understand the basic principles they use. Learn about basic privacy principles. Understand the need for a systematic approach to building, managing and assessing the security of information systems. Information security management standards, ISO / IEC 27000 system standards, Slovak legislation in force.
 
Course contents:
Introduction to Information Security:
- motivation, basic conceps, overview of related legislation
- information systems and the need for a systematic approach to building, managing and assessing their security
Cryptology basics, encryption systems with secret and public keys:
- Symmetric ciphers, Asymmetric ciphers, Data integrity algorithms
- Digital Signature, PKI System, keys management and distribution
Physical security, identification and authentication, network security specifics:
- User authentication
- RM OSI network model, specifics of network security implementation on individual layers of RM OSI model, firewall
Standardization in the field of information security, selection of the most used mechanisms:
- Security mechanisms of transport layer RM OSI - TLS
- Security mechanisms of network layer RM OSI - Ipsec
Human Factor in Security, Privacy:
- Security of e-mail, social networks and personal data
 
Recommended or required reading:
Basic:
STRNÁD, O. Bezpečnosť a manažment informačných systémov. Bratislava: STU v Bratislave FIIT, 2009. 344 p. ISBN 978-80-227-3040-2.

Recommended:
OCHODKOVÁ, E. Matematické základy kryptografických algoritmů. Ostrava: VSB Technicky univerzita Ostrava, Zapadočeská univerzita v Plzni, 2012.
Daniela CHUDÁ:. Bezpečnosť a ochrana IS. 1. vyd. Košice : Equilibria, 2013. 116 s. ISBN 978-80-7143-102-9.
ISO/IEC TR 13335 Information technology. Guidelines for the management of IT security. Techniques for the management of IT security
ISO/IEC 15408 Information technology — Security techniques — Evaluation criteria for IT security
ISO/IEC 27001 Information technology. Security techniques. Information security management systems.
Martin STANEK: KRYPTOLÓFIA. ZÁKLADY. VERZIA 1, JANUÁR 2015, HTTP://WWW.DCS.FMPH.UNIBA.SK/~STANEK/KRYPTOLOGIA_V1.PDF, CC BY-NC-ND 4.0
Ondrej STRNÁD: Manažment bezpečnosti IT. Bratislava : STU v Bratislave, 2002. 211 s. ISBN 80-227-1696-0
Renata JANOŠCOVÁ: Princípy informačnej bezpečnosti, 2014 , DOI 10.13140/RG.2.1.3361.7683, Publisher: Trenčín : Vysoká škola manažmentu v Trenčíne
Tipton, H., & Krause, M. 2007. Information security management handbook (6th ed.). Boca Raton, FL: Auerbach. ISBN: 9781420067088

 
Language of instruction: Slovak, English
 
Notes:
1. Introduction to information security, I .: basic concepts, components, security model. . 2. Introduction to information security, II.: Analysis and management of IT risks, standards, legislation, ethics. 3. Malicious code, protection against malicious code. Computer crime. 4. Security of operating systems - UNIX. 5. OS security - WINDOWS, ANDROID 6. Web applications security. 7. Mathematical basics of cryptography 8. Cryptology I. - Symmetric, asymmetric ciphers 9. Cryptology II. - Block cipher modes, stream cipher modes, hash functions 10. Cryptology III. - Practical cryptology, PGP standard, GNU Privacy Guard, Open SSL, mcrypt, ccrypt, GNU Emacs, EncryptPad 11. Applied cryptology: digital signature, key distribution, passwords 12. RM OSI network model
 
Courses evaluation:
Assessed students in total: 357

ABCDEFX
10,1 %22,1 %23,5 %24,4 %19,9 %0 %
 
Name of lecturer(s): Ing. Ivana Budinská, PhD. (examiner, instructor, lecturer)
doc. RNDr. Eugen Ružický, CSc. (person responsible for course)
Last modification: 18. 12. 2019
Supervisor: doc. RNDr. Eugen Ružický, CSc.


Last modification made by Ján Lukáš on 12/18/2019.

Type of output: