UINA365 Fundamentals of Information Security

Faculty of Philosophy and Science in Opava
Winter 2018
Extent and Intensity
2/0/0. 4 credit(s). Type of Completion: zk (examination).
Teacher(s)
doc. Ing. Petr Sosík, Dr. (lecturer)
Guaranteed by
doc. Ing. Petr Sosík, Dr.
Institute of Computer Science – Faculty of Philosophy and Science in Opava
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Course objectives
The course provides both basic introduction and a complex overview of information security, called also cybernetic security. After a profound explanation of basic principles of this quickly developing field, various approaches to the information protection will be analyzed, with emphasize on the level of information systems of public administration, in private companies and also at the government and state level.
Syllabus
  • 1. Fundamentals of the information security: what is information, properties and attributes, information security specifics. Elements of the security theory, what it is and what it is not, basic terms. A relation of information security to computer science. Approaches to the information security, practical examples, an overview of legal regulation and technical standards.
    2. A relation of information security to information processing systems: IS models, layers and infrastructure, the application layer, the service layer and their security aspects, micro IT x macro IT traffic, a list of professional categories and their processing tools, roles, relations, regulation x technological progress.
    3. Systematical management of information security: technical standards, legal requirements and standards, a structure of the information security management system. Integrated approach to the solution: not only IT, risk management, security strategy, security policies and directives, practical examples. Selected areas of security management: the management of continual processes, incident management, release management, identity management.
    4. A relation of technical and process security: pros and cons of both approaches, security design.
    5. Cybernetic security: security aspects of information systems over infrastructure of "large networks", security aspects of state assets protection. Security incidents: classification, incidents against privacy, accessibility and integrity of information, sociotechnical and technical incidents, possibilities of defense.
Literature
    required literature
  • Zákon č. 181/2014 Sb., o kybernetické bezpečnosti. Praha, 2014. info
  • ČSN ISO/IEC 27001, Informační technologie ? Bezpečnostní techniky ? Systém managementu bezpečnosti informací ? Požadavky. Praha, 2006. info
  • Doseděl, T. Počítačová bezpečnost a ochrana dat. Brno, Computer Press, 2004. info
    recommended literature
  • Stamp, M. Information Security: Principles and Practice. London, Wiley, 2011. info
Teaching methods
Interactive lecture
Lecture with a video analysis
Assessment methods (in Czech)
Projekt (zápočtový, semestrální, seminární)
Language of instruction
English
Further comments (probably available only in Czech)
The course can also be completed outside the examination period.
The course is also listed under the following terms Winter 2017, Winter 2019, Winter 2020.
  • Enrolment Statistics (Winter 2018, recent)
  • Permalink: https://is.slu.cz/course/fpf/winter2018/UINA365