Information sheet ECTS Syllabus
Course syllabus PRBIT_B - Principles of Information Technologies Security (FIIT - WS 2019/2020)
|University:||Slovak University of Technology in Bratislava|
|Faculty:||Faculty of Informatics and Information Technologies|
|Course unit code:||PRBIT_B|
|Course unit title:||Principles of Information Technologies Security|
|Mode of delivery, planned learning activities and teaching methods:|
|Recommended semester/trimester:||Information Security - bachelor (compulsory), 5. semester|
Information Security (conversion programme with a foundation year) - bachelor (compulsory), 7. semester
|Level of study:||1.|
|Prerequisites for registration:||none|
|In frame of exercise student must submit all assigned tasks and tasks must be accepted by Instructor. For this tasks student can earn 30 points. Further in frame of exercise student must pass two tests, each for 10 points as a maximum. Credits will not be assigned to a student who received from exercise less than 25 points. The final test is conducted in writing for 50 points as a maximum. Final student evaluation is the sum of points earned for exercise and final test. If the student earns at least 92 points then is assessed by the A grade, if earns at least 83 points then is assessed by the B grade, if earns at least 74 points then is assessed by the C grade, if earns at least 65 points then is assessed by the D grade, if earns at least 56 points then is assessed by the E grade, if earns less than 56 points then is assessed by the FX (fail).|
|Learning outcomes of the course unit:|
|By completion this course the student will master concepts, methods and tools to ensure the confidentiality, integrity and availability of assets of systems based on information technology. Furthermore, the student aquires the knowledge necessary to design secure computer and information systems, to risk analysis and to audit of information systems security.|
|1 Introduction to IT security, assets, threats, vulnerabilities and risks.
2 Identification and authentication, username and password, password management , single sign-on. Authentication in distributed systems, Kerberos.
3 Access control, access operations, access control structures, ownership. Ownership, comparing security attributes and reference monitors.
4 Protection in standard operating systems (1/2), Windows OS security.
5 Protection in standard operating systems (2/2) , Unix OS security.
6 Protection in the Android operating system.
7 Security in database systems, relational databases, transactions, data backup, access control, security of statistical databases.
8 Program security, letters and numbers, canonical representations, memory management, data and code, malicious code, covert channels.
9 Cryptography, classical ciphers, DES and RSA systems, hash functions, digital signature. Diffie - Hellman key exchange, use the encryption in protocols .
10 PKI and certificates, public key certification, structure of certificate, extensions in certificate , qualified certificates , application for certificate revocation, OCSP protocol.
11 Communication security, threats model in communication, IPsec and SSL / TLS.
|Recommended or required reading:|
|Language of instruction:||slovak and english|
|Assessed students in total: 0|
|Name of lecturer(s):||doc. Ing. Ladislav Hudec, CSc. (instructor, lecturer, person responsible for course) - slovak|
Ing. Ján Laštinec, PhD. (examiner, instructor, lecturer) - slovak
|Last modification:||29. 4. 2019|
|Supervisor:||doc. Ing. Ladislav Hudec, CSc. and programme supervisor|
Last modification made by RNDr. Marta Gnipová on 04/29/2019.