Branch of Study
Information Technology Security
|Degree programme: ||Information Technology, Master, 2-years|
|Form of study: ||attended|
|The enlistment of the branch into a study program:|
Information Technology Security Branch of Study (MBS for short in Czech) is instructed in Czech only. It is the branch of the Information Technology Follow-Up Master Study Program. It is under the control of common rules, conditions and criteria, which are defined in detail in the common part of the accreditation documentation of that study program and also by common ruling and directives of the BUT, especially those of the FIT BUT, as presented at internet addresses www.vutbr.cz and www.fit.vutbr.cz.
The primary goal of the study programme is to help students to understand the principles of security threats in information technology and appropriate security measures. Students will study basic security principles as well as they will understand the importance of security measures in large information systems. They will also know the principles of creating new solutions that lead to the design, installation, operation and maintenance of secure information systems. Mandatory subjects will provide further extension of knowledge that the students receive in the bachelors study programme - mainly in the field of information systems security, cryptography, data transfer, coding and biometrics. By selecting an appropriate set of optional subjects, students can further extend their abilities of theoretic foundations in the field of formal specification and verification or to focus on more practical issues - for example embedded systems and hardware, software development and operation or computer networks and communications.
|Extent of the final state examinations:|
The State Final Examination has two parts: A defense of the Master Thesis, and a discussion based on selected topics from the course "Information systems security" which is derived from compulsory courses of the MBS Branch of Study. The areas of possible questions must be approved by the Study Branch Council, and students will be informed about the selected topics at least 2 months before the state final examination is held in the particular academic year. The discussion will be held on two topics.
- The graduate will have a good knowledge of components and architectures of information systems with an emphasis on security components and security functions. The graduate will be able to integrate both the technical and software products used in secure information systems development. The graduate will have a solid knowledge (and the ability to apply) of security technologies and important standards that are essential for both the development and the operation of information systems.
- The graduate will be ready to solve projects, operate and maintain information systems where one of the key issues is security. The graduate will also be prepared for further research and development of methods, tools and technologies for developing secure components, applications and large systems. The graduate understand principles of security maintenance and is able to apply these principles in development of computer systems and networks.
- Specializations for profession: information systems projecting (or information systems in general), programmer, security architect, information systems maintenance, security administrator. The graduate of this study programme can use his/her knowledge in development and research departments as well as in institutions targeting on software system development with the primary concern on security. The graduate can also work in institutions that operate these information systems, e.g. government institutions and local administrations, in army, health service or any other industrial organizations.
|Content and quantification of professional practice:|
It is not required.
|Possible themes of final projects:|
- Security of VoIP systems
- Security Analysis of WiFi Networks
- Encrypting Landlines Phone Communication
- Effective Implementation of Elliptic Curves
- AES Tolerance to Timing Analysis
- Configurable Security Email Proxy
- Side Channel Analysis of Cryptographic Libraries
- Creation of Risk Analysis Model
- Biometric Recognition of 3D Faces
- Biometric Liveness Detection - Optical Features