UIINFNP007 Information and Cyber Security II

Faculty of Philosophy and Science in Opava
Summer 2024
Extent and Intensity
2/0/0. 4 credit(s). Type of Completion: zk (examination).
Teacher(s)
Ing. Vladimír Lazecký (lecturer)
Guaranteed by
Ing. Vladimír Lazecký
Institute of Computer Science – Faculty of Philosophy and Science in Opava
Timetable
each even Friday 8:05–11:20 B3a
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Course objectives
We continue the course "Information and Cyber Security I". This follow-up course focuses on issues of personal security in cyberspace, the recognition of security incidents, the work of security teams and the security of information systems in large-scale networks.
Learning outcomes
After completing the course the student will be able to:
- identify and summarize important features of digital identity;
- identify issues related to personal security in cyberspace;
-describe security incidents in cyberspace;
Syllabus
  • 1. Cyberspace, specifics of problem solving in cyberspace.
  • 2. Digital identity: definition, digital identity for public administration, digital identity in cyberspace, behavioral analysis for digital identity, anonymization, risks and threats from provided digital risks and risks of digital identity.
  • 3. Personal security: social networks, global web services, profiling, psychometrics, prediction, deployment AI systems, big data, risks, defense options.
  • 4. Security incidents: classification of security incidents, incidents against confidentiality, availability and integrity information, sociotechnical, technical incidents, defence options.
  • 5. Legal regulations in the Czech Republic and EU countries, technical standards and best practices, certification standards. Meaning and limits of legislation.
  • 6. Surveillance centres. SIEM/ISMS systems, log management, secure information flow management. Security teams at state and national level, security teams of large organizations, CERT, CSIRT, CIRC. Legal framework operation of security teams and coordination of their cooperation.
  • 7. Cybersecurity: security aspects of information systems over large network infrastructure, security aspects of protecting state assets.
Literature
    required literature
  • CCNA Cybersecurity Operations Companion Guide. Indianapolis, IN: Pearson Education, Cisco Press, 2018. ISBN 978-1-58713-439-5.
  • Zákon č. 181/2014 Sb.: Zákon o kybernetické bezpečnosti a o změně souvisejících zákonů. Praha, 2014. Dostupné také na: https://www.zakonyprolidi.cz/cs/2014-181.
    recommended literature
  • MOORE, Robert. Cybercrime: Investigating High-Technology Computer Crime. 2nd edition. London, New York: Routledge, 2015. ISBN 9781317522973.
  • SINGER, P. W. a Allan FRIEDMAN. Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press, c2014. ISBN 978-0-19-991809-6.
  • EVANS, Lester. Cybersecurity: What You Need to Know about Computer and Cyber Security, Social Engineering, the Internet of Things + an Essential Guide to Ethical Hacking for Beginners. Amazon Digital Services LLC - Kdp Print Us, 2019. ISBN 9781794647237.
  • CORDERO, Pedro D. Hacking the Cyber Threat a Cybersecurity Primer for Law-Enforcement Leaders and Executives. CreateSpace Independent Publishing Platform, 2017. ISBN 9781976048517.
Teaching methods
lectures, class discussion, group projects, presentations by professionals
Assessment methods
Active participation in the class, preparation of the final project according to the teacher's instructions
Language of instruction
Czech
The course is also listed under the following terms Summer 2022, Summer 2023.
  • Enrolment Statistics (recent)
  • Permalink: https://is.slu.cz/course/fpf/summer2024/UIINFNP007