Course details
Information System Security and Cryptography
BID Acad. year 2016/2017 Summer semester
Introduction, security standards, security management. Evaluation of security. Data transmission security, operating system and database security. Cryptographic algorithms and analysis, public key cryptography. Electronic commerce. Tamper resistant hardware.
Guarantor
Language of instruction
Completion
Time span
- 39 hrs lectures
- 4 hrs projects
Assessment points
- 100 pts final exam (written part)
Department
Subject specific learning outcomes and competences
Students will learn basic principles of secure information systems design and security analysis.
Learning objectives
To acquaint with with the advanced concepts of information systems security. The Another area covered is applied cryptography, including classical cryptography and modern secret key and public key cryptography.
Prerequisite knowledge and skills
Basic knowledge of operating systems and computer networks.
Study literature
- Hanáček, P., Staudek, J.: Bezpečnost informačních systémů, ÚSIS, Praha, 2000, s. 127, ISBN80-238-5400-3
- Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0
- Savard, J. J. G.: A Cryptographic Compendium, 2000, dostupné na WWW
Fundamental literature
-
Menezes, Van Oorschot, Vanstone: Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997.
Syllabus of lectures
- Introduction
- Security standardisation
- Security management
- Security evaluation and audit
- Selected security mechanisms
- Advance cryptographic algorithms
- Public key infrastructure (PKI)
- Electronic commerce
- Tamper resistant hardware
Progress assessment
Study evaluation is based on marks obtained for specified items. Minimimum number of marks to pass is 50.
Controlled instruction
Project and presentation of selected article