Title:

Information System Security

Code:BIS
Ac.Year:2009/2010
Term:Winter
Study plans:
ProgramBranchYearDuty
IT-MSC-2MBI1stCompulsory-Elective - group O
IT-MSC-2MBS1stCompulsory
IT-MSC-2MGM-Elective
IT-MSC-2MGM.-Elective
IT-MSC-2MIN-Compulsory-Elective - group B
IT-MSC-2MIN.2ndElective
IT-MSC-2MIS2ndCompulsory
IT-MSC-2MIS.2ndCompulsory
IT-MSC-2MMI-Elective
IT-MSC-2MMM2ndCompulsory-Elective - group B
IT-MSC-2MPS2ndElective
IT-MSC-2MPV2ndCompulsory-Elective - group D
IT-MSC-2MSK2ndCompulsory
IT-MSC-2EITE2ndCompulsory
Language:Czech, English
Private info:http://www.fit.vutbr.cz/study/courses/BIS/private/
Credits:5
Completion:examination (written)
Type of
instruction:
Hour/semLecturesSem. ExercisesLab. exercisesComp. exercisesOther
Hours:3900013
 ExaminationTestsExercisesLaboratoriesOther
Points:70150015
Guarantee:Hanáček Petr, doc. Dr. Ing., DITS
Lecturer:Hanáček Petr, doc. Dr. Ing., DITS
Instructor:Barabas Maroš, Ing., DITS
Henzl Martin, Ing. Mgr., DITS
Kumpošt Marek, RNDr., Ph.D., DITS
Faculty:Faculty of Information Technology BUT
Department:Department of Intelligent Systems FIT BUT
Substitute for:
Computer Security and Cryptography (BKR), DITS
 
Learning objectives:
The goal is to make students familiar with the basic concepts of information systems security.
Description:
The course aims to the security goals, security functions, and security mechanisms. The content is: Introduction into information security, basic terms, threats, weak points, security measures, criteria for system security assessment, Common Criteria, data transmission security, operating system and database security, malicious software,  role of cryptography.
Learning outcomes and competences:
Students will learn basic principles of information systems security. They will learn also terminology, basic security goals, functions, and mechanisms.
Syllabus of lectures:
  1. Introduction
  2. Threats, vulnerabilities
  3. Security measures
  4. Criteria for system security assessment
  5. Common criteria (CC)
  6. Security functions
  7. Risk analysis
  8. Data transmission security
  9. Operating system security
  10. Database security
  11. Web security
  12. Smart card applications
  13. Role of cryptography
Syllabus - others, projects and individual work of students:
  1. A homework on security mechanisms.
  2. A homework on applied cryptography.
Fundamental literature:
  1. Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999, ISBN 0-13-869017-0
Study literature:
  1. Savard, J. J. G.: A Cryptographic Compendium, 2000, available on WWW
Progress assessment:
A mid-term exam evaluation and an evaluation of projects.