VIKMB48 Security Informatics

Faculty of Arts
Spring 2015

The course is not taught in Spring 2015

Extent and Intensity
1/1/0. 4 credit(s). Type of Completion: k (colloquium).
Teacher(s)
PhDr. Pavla Vizváry, Ph.D. LL.M. (lecturer)
Guaranteed by
PhDr. Petr Škyřík, Ph.D.
Division of Information and Library Studies – Department of Czech Literature – Faculty of Arts
Contact Person: Mgr. Sabina Kubisová
Supplier department: Division of Information and Library Studies – Department of Czech Literature – Faculty of Arts
Timetable
Tue 9:10–10:45 C41
Course Enrolment Limitations
The course is offered to students of any study field.
The capacity limit for the course is 20 student(s).
Current registration and enrolment status: enrolled: 0/20, only registered: 0/20, only registered with preference (fields directly associated with the programme): 0/20
Course objectives
The course is an introduction to the broader topic of security informatics. At the end of the course students will be able to: identify security issues for organizations and companies,
suggest appropriate policies and procedures for the organization. Against subject VIKBB39 Information security is this less social, more technically oriented.
Syllabus
  • 1. Introduction to the course, basic terminology, organizations and standards 2. Security Policy of Institution: risk analysis, credibility assessment of information systems, writing security documents 3. Identity in an electronic environment: identity management, authentication methods 4. Cryptology: basic principles, steganography, symmetric cryptology, modern block cipher 5. Asymmetric cryptography: principles, PKI and digital signature, RSA, PGP, SSL / TLS ... 6. Safety tools: physical security, anti-virus, firewall, webfiltr, audit systems, pentesty, analysis of security information 7. Network Security: IDS / IPS, IPv6, browser, HTTP, DNS, botnets and DDoS, ATP, e-mail, wireless and cloud security 8. Mobile device security: differences in OS, BYOD, the specifics of security tools and options 9. Man in IT security: social engineering, information privacy, monitoring, PET 10. Searching of digital footprint: Footprinting and search engine hacking, behavioral analysis, software agents, Consumer-generated media and analysis, digital forensics and analysis techniques forcrimes mapping 11. Steps of State for increasing of IT security: e-commerce, identity theft, SCADA, Emergency and disaster prevention and response 12. State Security in the information society: (para) legal documents, e-governance and credibility threats, the information warfare, extremism and terrorism on the Internet
Teaching methods
Lectures, discussion, group project
Assessment methods
1. Attendance: 10 points (for each absence is minus one point.) 2. Search and summarized information resources (about 300 words): 10 points (2-3 articles. Topics will be distributed at the beginning of the semester. Summary is not expert source, there are no citations, rather self-performance of the content, own opinions and suggestions for discussion. The texts will be available to the other at least 3 days before solving the topic. It will be evaluated in depth of explanation, selection and analysis, clarity of information presentation and the ability to provoke debate.) 3. Leading the part of the lesson based on summarized resources (about 5 min. presentation, 15 min. discussion): 25 points (Based on the previous point.) 4. Team (3-4): a plan to get employees for training (20 min. presentation): 30 points (Groups of 3-4 students suggest how to motivate, engage and empower employees of selected organizations to training about information security. It will be presented in the last third of the semester.) 5. A letter for real organization management about security policy (1 page): 25 points (Each individually write one page letter to the existing organization of their choice, which justifies the need for security policy just for this organization and why it should be promoted by the management. The result will be sent to this organization, and I will be in the copy - no later than two weeks before the end of the semester.) You must obtain min. 60 points for completion of the course. In case of plagiarism the result is warning in the first case, after the latter case negative assessment of thw course will follow. When anything is not clear or you have any questions, please contact me as soon as possible, learning takes place primarily in the interaction. When you do not solve the situation in time, do not be surprised that I will not take it into account later. Assessment methods correspond to the subject INLS 566 Information assirance (University of North Carolina at Chapel Hill).
Language of instruction
Czech
Further Comments
Study Materials
The course is taught annually.

  • Permalink: https://is.muni.cz/course/phil/spring2015/VIKMB48