Popis předmětu - BE2M32IBEA
BE2M32IBEA | Information Security | ||
---|---|---|---|
Role: | PV | Rozsah výuky: | 2P + 2C |
Katedra: | 13132 | Jazyk výuky: | EN |
Garanti: | Zakončení: | Z,ZK | |
Přednášející: | Kreditů: | 6 | |
Cvičící: | Semestr: | L |
Anotace:
The Information Security course provides a complete source of information on the field of security of information systems and information technologies. The most of information in today society is created, transferred, stored in electronic form so information security is very important part of it. Technical background for information security is provided by cryptology.Cíle studia:
Students acquire a comprehensive overview of information security. They'll learn the principles of modern cryptographic algorithms and security protocols.Osnovy přednášek:
1. | Introduction to Cryptology, Basic Terms, Historical Overview | |
2. | Block ciphers | |
3. | Cryptographic Modes of Operation | |
4. | Stream Ciphers | |
5. | Random and Pseudoranmdom Number Generators | |
6. | Public-key Algorithms | |
7. | Hash functions | |
8. | Authentication Protocols | |
9. | Digital Signature, Certification Authority | |
10. | Security in Wireless Networks | |
11. | Security in Mobile network | |
12. | Virtual Private Network security - IPsec, OpenVPN, SSL-VPN | |
13. | SSL/TLS, DTLS | |
14. | VoIP security |
Osnovy cvičení:
1. | Introduction, passing conditions, health and safety regulations | |
2. | Cryptanalysis of monoalplhabetic substitutions | |
3. | Cryptanalysis of polyalphabetic substitutions | |
4. | Cryptanalysis of transposition ciphers | |
5. | Cryptanalysis of asymmetric key ciphers | |
6. | Mid-term test | |
7. | Introduction to laboratory exercises | |
8. | Laboratory exercises | |
9. | Laboratory exercises | |
10. | Laboratory exercises | |
11. | Laboratory exercises | |
12. | Laboratory exercises | |
13. | Final Test | |
14. | Assesment |
Literatura:
1) | Stamp M., Information Security - Principles and Practice, Wiley, 2006, ISBN: 0-471-73848-4 | |
2) | Mao W., Modern Cryptography - Theory & Practice, Prentice-Hall, 2004, ISBN: 0-13-066943-1 | |
3) | Menezes A, Vanstone S, van Oorschot P., Handbook of Applied Cryptography, CRC Press, 1996, available at http://www.cacr.math.uwaterloo.ca/hac/ |
Požadavky:
1. | Knowledge of modular arithmetics and algebra. | |
2. | ISO/OSI network model, knowledge of computer networks principles | |
3. | Programming in high-level languages (Java,C#, C/C++) |
Klíčová slova:
security, cryptoghraphy, symmetric key algorithm, public key algorithms, network protocols, security protocols, hash function, authentication, integrity, confidentiality, malware, APT, PKIPředmět je zahrnut do těchto studijních plánů:
Plán | Obor | Role | Dop. semestr |
MEEK6_2018 | Mobile Communications | PV | 2 |
MEEK5_2018 | Communication Systems and Networks | PV | 2 |
MEEK4_2018 | Technology of the Internet of Things | PV | 2 |
Stránka vytvořena 3.10.2023 14:50:41, semestry: Z/2023-4, Z/2024-5, připomínky k informační náplni zasílejte správci studijních plánů | Návrh a realizace: I. Halaška (K336), J. Novák (K336) |