Course details

Information System Security and Cryptography

BID Acad. year 2020/2021 Summer semester

Current academic year

Introduction, security standards, security management. Evaluation of security. Data transmission security, operating system and database security. Cryptographic algorithms and analysis, public key cryptography. Electronic commerce. Tamper resistant hardware.

Areas for the Doctoral State Exam:

  1. Information system security basics.
  2. Security evaluation standards.
  3. Security policies.
  4. Basic security functions.
  5. Symmetric cryptography.
  6. Asymmetric cryptography.
  7. Public key infrastructure - PKI.
  8. Web applications security.
  9. Communication security.
  10. Operating system security.

Guarantor

Course coordinator

Language of instruction

Czech, English

Completion

Examination

Time span

  • 39 hrs lectures
  • 4 hrs projects

Assessment points

  • 100 pts final exam

Department

Lecturer

Instructor

Subject specific learning outcomes and competences

Students will learn basic principles of secure information systems design and security analysis.
A deeper ability to design secure systems.

Learning objectives

To acquaint with with the advanced concepts of information systems security. The Another area covered is applied cryptography, including classical cryptography and modern secret key and public key cryptography.

Prerequisite knowledge and skills

Basic knowledge of operating systems and computer networks.

Study literature

  • Savard, J. J. G.: A Cryptographic Compendium, 2000, dostupné na WWW
  • Stallings, W.: Cryptography and Network Security, Pearson India, 2018, ISBN 9789332585225
  • Bishop, M.:Computer Security Art and Science, 2nd Edition, November 2018, Addison-Wesley Professional, ISBN: 9780134097145

Syllabus of lectures

  1. Introduction
  2. Security standardisation
  3. Security management
  4. Security evaluation and audit
  5. Selected security mechanisms
  6. Advance cryptographic algorithms
  7. Public key infrastructure (PKI)
  8. Electronic commerce
  9. Tamper resistant hardware

Syllabus - others, projects and individual work of students

Studying a state-of-the-art research papers and preparing a report or a lecture based on the papers read.

Progress assessment

Discussions within the lectures, a check of the prepared report.

Controlled instruction

Project and presentation of selected article

Course inclusion in study plans

Back to top