FPF:UIINFNP004 Information and Cyber Sec. I - Course Information
UIINFNP004 Information and Cyber Security I
Faculty of Philosophy and Science in OpavaWinter 2024
- Extent and Intensity
- 2/0/0. 4 credit(s). Type of Completion: zk (examination).
- Teacher(s)
- Ing. Vladimír Lazecký (lecturer)
- Guaranteed by
- Ing. Vladimír Lazecký
Institute of Computer Science – Faculty of Philosophy and Science in Opava - Timetable
- each even Friday 8:05–11:20 B3a
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Informatics (programme FPF, INFOR-nav)
- Course objectives
- The course will provide background information and allow the student to develop a comprehensive overview of information and cyber security. Emphasis will be placed on understanding the basic principles of this rapidly evolving field, discussing possible approaches to information protection in the environment of information systems of public administrations, private companies, and at the national level.
- Learning outcomes
- Upon completion of the course the student will be able to:
- describe the basic principles of cyber security;
- identify and describe approaches to addressing security;
- describe security solutions in terms of systematic security management, legal requirements and standards; - Syllabus
- 1. Basics of information security: what is information, its properties and attributes, specifics in relation to theory security. Basics of security theory, what is and what is not security, basic concepts, basics of the field of information of information security, its relationship to computer science.
- 2. Approaches to dealing with information security, examples from practice, basic overview of regulation, legal standards and technical standards.
- 3. Information processing systems in relation to information security: models of information systems, layers, infrastructure, application layer, service layer and their security aspects, operations.
- 4. Micro IT vs. macro IT, overview of professional areas and their process tools, roles, linkages, regulation vs. technological developments.
- 5. Systematic management of information security management: information security management - technical standards, legal requirements and standards, information security management system structure.
- 6. Integrated approach to solutions: not just IT, risk management, security strategy, security policies and guidelines, practical examples. Selected areas of security management: business continuity management, incident management, release management, identity management.
- 7. Relationship between technical and process security: capabilities and limitations of each approach, security design.
- Literature
- required literature
- ČSN EN ISO/IEC 27001 (369797) Informační technologie - Bezpečnostní techniky - Systémy řízení bezpečnosti informací - Požadavky. Praha, 2014. EAN: 8590963958057.
- DOSEDĚL, Tomáš. Počítačová bezpečnost a ochrana dat. Brno: Computer Press, 2004, 190 s. ISBN 80-251- 0106-1.
- Zákon č. 181/2014 Sb.: Zákon o kybernetické bezpečnosti a o změně souvisejících zákonů. Praha, 2014. Dostupné také na: https://www.zakonyprolidi.cz/cs/2014-181.
- recommended literature
- American institute of Certified Public Accountants, Inc. Guide: Reporting on an Entity's Cybersecurity Risk Management Program and Controls. New York: John Wiley, 2017. ISBN 978-1-94354-672-5.
- ARNOLD, Rob. Cybersecurity: A Business Solution: An executive perspective on managing cyber risk. Winston-Salem: Threat Sketch, 2017. ISBN 978-0692944158.
- HRŮZA, Petr, Oldřich LUŇÁČEK, Vlastimil MALÝ a Lubomír ALMER. Kybernetická bezpečnost a kritická informační infrastruktura. Praha: Powerprint, 2018. ISBN 978-807-5681-225.
- NEZMAR, Luděk. GDPR: praktický průvodce implementací. Praha: Grada Publishing, 2017. Právo pro praxi. ISBN 978-80-271-0668-4.
- The EU General Data Protection Regulation (GDPR): A Practical Guide. Berlin, Hamburg: Springer International Publishing, 2017. ISBN 978-3-319-57-958-0.
- Stamp, M. Information Security: Principles and Practice. London, Wiley, 2011. info
- Teaching methods
- lectures, discussion
- Assessment methods
- Active participation in the class, preparation of the final project according to the teacher's instructions
- Language of instruction
- Czech
- Enrolment Statistics (recent)
- Permalink: https://is.slu.cz/course/fpf/winter2024/UIINFNP004