ICT Security and Data Protection
Ing. Lukáš Pavlík, Ph.D.
ICT Security and Data Protection
Info
Období
léto 2022
The Goal of Course and Conditions of Exam

  • to pass the exam, it is necessary to pass at least 65 % of the test.

Recommended literature:

  • ROHMEYER, Paul a Jennifer L. BAYUK. Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions. New York: Apress, 2018, 259 s. ISBN 9781484241936.
  • HODSON, Christopher J. Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls. London: Kogan Page, 2019, 416 s. ISBN 9780749484125.

Kapitola obsahuje:
1
Studijní materiály
1
Studijní text
Učitel doporučuje studovat od 14. 2. 2022 do 20. 2. 2022.
Kapitola obsahuje:
1
Studijní text
Učitel doporučuje studovat od 21. 2. 2022 do 27. 2. 2022.
Kapitola obsahuje:
2
Studijní materiály
1
Studijní text
Učitel doporučuje studovat od 28. 2. 2022 do 6. 3. 2022.
Kapitola obsahuje:
1
Studijní materiály
1
Studijní text
Učitel doporučuje studovat od 7. 3. 2022 do 13. 3. 2022.
Kapitola obsahuje:
1
Studijní materiály
1
Studijní text
Učitel doporučuje studovat od 14. 3. 2022 do 20. 3. 2022.
Kapitola obsahuje:
1
Studijní text
Učitel doporučuje studovat od 21. 3. 2022 do 27. 3. 2022.
Kapitola obsahuje:
1
Studijní materiály
1
Studijní text
Učitel doporučuje studovat od 28. 3. 2022 do 3. 4. 2022.
Kapitola obsahuje:
1
Studijní text
Učitel doporučuje studovat od 4. 4. 2022 do 10. 4. 2022.
Kapitola obsahuje:
1
Studijní text
Učitel doporučuje studovat od 11. 4. 2022 do 17. 4. 2022.
Kapitola obsahuje:
1
Studijní text
Učitel doporučuje studovat od 18. 4. 2022 do 24. 4. 2022.
Kapitola obsahuje:
1
Studijní materiály
1
Studijní text
Učitel doporučuje studovat od 25. 4. 2022 do 1. 5. 2022.
Kapitola obsahuje:
1
Studijní materiály
1
Studijní text
Učitel doporučuje studovat od 2. 5. 2022 do 8. 5. 2022.
Kapitola obsahuje:
1
Studijní materiály
1
Studijní text
Učitel doporučuje studovat od 9. 5. 2022 do 15. 5. 2022.

Týden 1

Topic: Introduction to the issue of security – the concept of security, enterprise information security, basic terms

After studying the chapter you will be able to:

  • Characterize area of security
  • Define basic terms
  • Clarify politics of passwords

Keyword:

Cyber security, password, security measure.


Týden 2

Topic: Multi-layered security (defence in depth) of information systems

After studying the chapter you will be able to:

  • Define multi-layered security
  • Create effective measures for data security

Keywords:

Multi-layered security, measure, risk.

Týden 3

Topic: Security in operating systems, access management, identification, authentication, authorization

After studying the chapter you will be able to:

  • Define authentication
  • Clarify authorization
  • Characterize types of encryption

Keywords: 

Authentication, authorization, sym,etric, asymmetric, encryption.

Týden 4

Topic: Internet security, protocols, wireless networks

After studying the chapter you will be able to:

  • List types of security protocols
  • Characterize secure email communication
  • Define wireless networks 

Keywords:

Internet security, protocols, security tools.

Týden 5

Topic: Workstation security

After studying the chapter you will be able to:

  • Define firewalls
  • Characterize worksation in rea of cyber security
  • Clarify types of security sotware

Keywords:

Firewall, user, security software, SCADA system

Týden 6

Topic: Selected cyber threats and their characteristics

After studying the chapter you will be able to:

  • Characterize selected cyber threats
  • Define potential impacts of cyber threats
  • List some examples of cyber attacks 

Keywords:

Threat, attack, impact.

Týden 7

Topic: Information security management system – ISO / IEC 27000, PDCA, ITIL methodology principles

After studying the chapter you will be able to:

  • Characterize ISMS
  • Define ISO 27001, 27002, 27005
  • Describe methodology ITIL
  • Characterize methodology COBIT

Keywords:

ISMS, ISO, ITIL, COBIT

Týden 8

Topic: Security risk analysis (identification of assets, risk assessment, the draft of countermeasures)

After studying the chapter you will be able to:

  • Define risk analysis
  • List methods of risk analysis
  • Characterize process of evaluation risks

Keywords:

Risk analysis, methods, probability. 

Týden 9

Topic: Realization of security – conception of security, security policy, security measures

After studying the chapter you will be able to:

  • Define dimensions of security
  • Characterize security policy
  • Create security politics

Keywords:

Dimension, security, policy, security environment


Týden 10

Topic: Cyber threats and their impacts from the perspective of insurance industry

After studying the chapter you will be able to:

  • Characterize insurance and its role in the field of cyber security
  • Define European Union legislation on information systems security
  • List the types of insurance that relate to cyber security
Keywords:

Insurance, risk, financial impact, personal data.

Týden 11

Topic: Papers and electronic documents – definition, properties, security and authentication, electronic signature

After studying the chapter you will be able to:

  • Define the term electronic document
  • Describe the basic principles of electronic document protection
  • Explain the requirements of the eIDAS Regulation
Keywords:

Act, document, electronic document.

Týden 12

Topic: Data backup and recovery of system

After studying the chapter you will be able to:

  • Define types of backups
  • List methods of backups
  • Describe recovery software

Keywords:

Backup, recovery, plan, data.

Týden 13

Topic: The Biggest Cyber Threats of Recent Years

After studying the chapter you will be able to:

  • list the biggest cyber threats of recent years,
  • characterize the procedure of cyber threats investigation,
  • define the possible impacts of cyber threats in the context of today's societ.

Keywords:

Ransomware, phishing, social engineering, incident, investigation..