FPF:UIMOIBK022 Security and Data Analysis - Course Information
UIMOIBK022 Security and Data Analysis
Faculty of Philosophy and Science in OpavaWinter 2024
- Extent and Intensity
- 0/0/0. 2 credit(s). Type of Completion: z (credit).
- Teacher(s)
- Ing. Vladimír Lazecký (seminar tutor), RNDr. Šárka Vavrečková, Ph.D. (deputy)
RNDr. Šárka Vavrečková, Ph.D. (seminar tutor) - Guaranteed by
- RNDr. Šárka Vavrečková, Ph.D.
Institute of Computer Science – Faculty of Philosophy and Science in Opava - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Information and communication technologies (programme FPF, MOI)
- Course objectives
- The course is focused on secure methods of data acquisition and analysis. Students will learn methods used for data recovery not available in common ways, and also methods used in forensic analysis in non-destructive data acquisition for use in evidence proceedings.
Students will be acquainted with tools for data acquisition from storage media, their subsequent analysis and obtaining other relevant information from operating system and selected applications. Windows and Linux tools and live Linux distributions for this purpose will be discussed. - Learning outcomes
- Students will be able to:
- apply data recovery procedures unavailable by conventional means;
- use the methods of forensic analysis for non-destructive data acquisition for use in evidence;
- use tools to retrieve data from storage media;
understands methods and resources for securing some devices, social networks and other Internet services, including encryption. - Syllabus
- 1. Introduction to forensic science. Cybercrime, security teams, forensic investigation, legislation.
- 2.-3. Information from public sources, OSINT.
- 4. Tools for analyzing data in various operating systems. Connecting a disk to a remote computer via adapter. Possibilities of obtaining a disk image (ISO) and its analysis, hidden areas on the disk.
- 5. Specialized distributions and applications intended for security purposes.
- 6.-7. Introduction to cryptography. Encryption algorithms, data integrity.
- 8.-9. Cryptography in practice. Digital signature, certificate, PKI. Data protection on storage media, secure authentication, data protection on Internet.
- 10.-11. Personal security.
- 12.-13. Network communication security. E-mail structure. Vulnerability databases, CVE and CWE records, OVAL. Detection of security problems in the network. Network monitoring.
- Literature
- required literature
- VAVREČKOVÁ, Šárka. Analýza dat: Úvod do digitální forenzní analýzy a metod ochrany dat. Slezská univerzita v Opavě, 2024 (skripta jsou průběžně aktualizována), 180 s.
- recommended literature
- FRUHLINGER, Josh; SHARMA, Ax a BREEDEN, John. 15 top open-source intelligence tools. Online. CS Online. 2023.
- OSINT Framework [online]. Dostupné na: https://osintframework.com/
- SOOD, Aditya K. Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks. 2. ilustrované vydání. Mercury Learning and Information, 2023. ISBN 9781501518027.
- KOLOUCH, Jan a BAŠTA, Pavel. CyberSecurity. CZ.NIC. Praha: CZ.NIC, z.s.p.o., 2019. ISBN 978-80-88168-31-7. Dostupné také z: https://knihy.nic.cz/files/edice/cybersecurity.pdf.
- ŠKOP, Miroslav. Biometrické systémy a jejich slabá místa. Online. TZB Info. Dostupné z: https://www.tzb-info.cz/bezpecnost/20337-biometricke-systemy-a-jejich-slaba-mista.
- LYLE, D. P. Forensics for dummies. 2nd edition. John Wile, 2016. ISBN 978-111-9181-682. URL info
- MARAS, Marie-Helen. Computer forensics: cybercriminals, laws, and evidence. 2nd ed. Burlington, USA: Jones & Bartlett Publishers, 2014. ISBN 978-1-4496-9222-3. info
- SANDERS, Chris. Analýza sítí a řešení problémů v programu Wireshark. 1. vyd. Brno: Computer Press, 2012. ISBN 978-80-251-3718-5. info
- MOZAYANI, Ashraf a Carla NOZIGLIA. The forensic laboratory handbook: procedures and practice. 2nd ed. New York, N.Y.: Humana Press, 2011. ISBN 16-076-1872-9. info
- Jirovský, Václav. Kybernetická kriminalita: nejen o hackingu, crackingu, virech a trojských koních bez tajemství. Praha: Grada, 2007. ISBN 978-80-247-1561-2. URL info
- Teaching methods
- Interactive lessons
Tutorials in computer class - Assessment methods
- Compulsory active participation in seminars min. 75 %.
Seminar work on a chosen topic. - Language of instruction
- Czech
- Further comments (probably available only in Czech)
- Study Materials
The course can also be completed outside the examination period.
Information on the extent and intensity of the course: 8 hod/sem.
- Enrolment Statistics (recent)
- Permalink: https://is.slu.cz/course/fpf/winter2024/UIMOIBK022