PA018 Advanced Topics in Information Technology Security

Faculty of Informatics
Autumn 2024
Extent and Intensity
1/1/2. 4 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
In-person direct teaching
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Kamil Malinka, Ph.D. (lecturer)
prof. RNDr. Tomáš Pitner, Ph.D. (lecturer)
RNDr. Adam Kučera, Ph.D. (lecturer)
RNDr. Daniel Tovarňák, Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (lecturer)
RNDr. Vojtěch Suchánek (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 24. 9. to Tue 17. 12. Tue 12:00–13:50 A318
Prerequisites
PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || IA174 Fundaments of Cryptography ||NOW( IA174 Fundaments of Cryptography )||SOUHLAS
Knowledge of English (intermediate level). Students shall also pass at least one of the following courses (PV079, PV157, IA174) before registering this course.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 35 student(s).
Current registration and enrolment status: enrolled: 39/35, only registered: 5/35, only registered with preference (fields directly associated with the programme): 4/35
fields of study / plans the course is directly associated with
there are 31 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
understand advanced concepts in designing, developing, managing and analyzing security systems;
review inter-dependencies between system components and point out major vulnerabilities;
design security mechanisms;
reflect requirements and demands that have to be addressed when solving problems and security issues in common computer systems;
create both written project report and (oral) presentation of the project;
argue for their solution or analysis in the ways implied above.
Learning outcomes
Graguate of this course shall be able to:
understand advanced concepts in designing, developing, managing and analyzing security systems;
review inter-dependencies between system components and point out major vulnerabilities;
design security mechanisms;
reflect requirements and demands that have to be addressed when solving problems and security issues in common computer systems;
create both written project report and (oral) presentation of the project;
argue for their solution or analysis in the ways implied above.
Syllabus
  • This advanced-level course reviews selected topics in IT security in a greater depth. Students are expected to work on several assignments and a term project.
  • This course is given in English. Assignments and the term project are to be handed in also in English, yet final exam answers are accepted in both Czech and English. Guest lectures of industry experts will complement the core topics lectured. Topics include issues related to the following areas:
  • Interaction of security and cryptographic mechanisms, namely of public key techniques. Key management and protocols.
  • Security policies. Risk assessment and analysis. Role of standards and evaluation (criteria).
  • Authentication, namely issues of biometric authentication.
  • Security in communications and networks.
  • Secure hardware, smartcards.
  • Trust, electronic and/vs. real relations.
  • Malware.
  • Security of critical infrastructures.
  • Processing of big data for security operations.
Literature
    recommended literature
  • Security Engineering: A Guide to Building Dependable Distributed Systems. (Third Edition) Ross Anderson. 2020
    not specified
  • VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
Teaching methods
Lectures, assignments (home work), independent project work including the project presentation and written report.
Assessment methods
Written exam (closed book) 40%, term project 30% and assignments throughout the term also 30%. Course and assignments are given in English. Assignments are to be handed in also in English, yet final exam answers and term project are accepted in both Czech and English.
Language of instruction
English
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2007, Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2013, Autumn 2013, Autumn 2014, Autumn 2015, Autumn 2016, Autumn 2017, Autumn 2018, Autumn 2019, Autumn 2020, Autumn 2021, Autumn 2022, Autumn 2023.
  • Enrolment Statistics (recent)
  • Permalink: https://is.muni.cz/course/fi/autumn2024/PA018