ICT Security and Data Protection
Ing. Lukáš Pavlík, Ph.D.
ICT Security and Data Protection
The Goal of Course and Conditions of Exam

  • to pass the exam, it is necessary to pass at least 65 % of the test.

Recommended literature:

  • ROHMEYER, Paul a Jennifer L. BAYUK. Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions. New York: Apress, 2018, 259 s. ISBN 9781484241936.
  • HODSON, Christopher J. Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls. London: Kogan Page, 2019, 416 s. ISBN 9780749484125.

Chapter contains:
1
Study Materials
1
Study text
Teacher recommends to study from 14/2/2022 to 20/2/2022.
Chapter contains:
1
Study text
Teacher recommends to study from 21/2/2022 to 27/2/2022.
Chapter contains:
2
Study Materials
1
Study text
Teacher recommends to study from 28/2/2022 to 6/3/2022.
Chapter contains:
1
Study Materials
1
Study text
Teacher recommends to study from 7/3/2022 to 13/3/2022.
Chapter contains:
1
Study Materials
1
Study text
Teacher recommends to study from 14/3/2022 to 20/3/2022.
Chapter contains:
1
Study text
Teacher recommends to study from 21/3/2022 to 27/3/2022.
Chapter contains:
1
Study Materials
1
Study text
Teacher recommends to study from 28/3/2022 to 3/4/2022.
Chapter contains:
1
Study text
Teacher recommends to study from 4/4/2022 to 10/4/2022.
Chapter contains:
1
Study text
Teacher recommends to study from 11/4/2022 to 17/4/2022.
Chapter contains:
1
Study text
Teacher recommends to study from 18/4/2022 to 24/4/2022.
Chapter contains:
1
Study Materials
1
Study text
Teacher recommends to study from 25/4/2022 to 1/5/2022.
Chapter contains:
1
Study Materials
1
Study text
Teacher recommends to study from 2/5/2022 to 8/5/2022.
Chapter contains:
1
Study Materials
1
Study text
Teacher recommends to study from 9/5/2022 to 15/5/2022.

Týden 1

Topic: Introduction to the issue of security – the concept of security, enterprise information security, basic terms

After studying the chapter you will be able to:

  • Characterize area of security
  • Define basic terms
  • Clarify politics of passwords

Keyword:

Cyber security, password, security measure.


Týden 2

Topic: Multi-layered security (defence in depth) of information systems

After studying the chapter you will be able to:

  • Define multi-layered security
  • Create effective measures for data security

Keywords:

Multi-layered security, measure, risk.

Týden 3

Topic: Security in operating systems, access management, identification, authentication, authorization

After studying the chapter you will be able to:

  • Define authentication
  • Clarify authorization
  • Characterize types of encryption

Keywords: 

Authentication, authorization, sym,etric, asymmetric, encryption.

Týden 4

Topic: Internet security, protocols, wireless networks

After studying the chapter you will be able to:

  • List types of security protocols
  • Characterize secure email communication
  • Define wireless networks 

Keywords:

Internet security, protocols, security tools.

Týden 5

Topic: Workstation security

After studying the chapter you will be able to:

  • Define firewalls
  • Characterize worksation in rea of cyber security
  • Clarify types of security sotware

Keywords:

Firewall, user, security software, SCADA system

Týden 6

Topic: Selected cyber threats and their characteristics

After studying the chapter you will be able to:

  • Characterize selected cyber threats
  • Define potential impacts of cyber threats
  • List some examples of cyber attacks 

Keywords:

Threat, attack, impact.

Týden 7

Topic: Information security management system – ISO / IEC 27000, PDCA, ITIL methodology principles

After studying the chapter you will be able to:

  • Characterize ISMS
  • Define ISO 27001, 27002, 27005
  • Describe methodology ITIL
  • Characterize methodology COBIT

Keywords:

ISMS, ISO, ITIL, COBIT

Týden 8

Topic: Security risk analysis (identification of assets, risk assessment, the draft of countermeasures)

After studying the chapter you will be able to:

  • Define risk analysis
  • List methods of risk analysis
  • Characterize process of evaluation risks

Keywords:

Risk analysis, methods, probability. 

Týden 9

Topic: Realization of security – conception of security, security policy, security measures

After studying the chapter you will be able to:

  • Define dimensions of security
  • Characterize security policy
  • Create security politics

Keywords:

Dimension, security, policy, security environment


Týden 10

Topic: Cyber threats and their impacts from the perspective of insurance industry

After studying the chapter you will be able to:

  • Characterize insurance and its role in the field of cyber security
  • Define European Union legislation on information systems security
  • List the types of insurance that relate to cyber security
Keywords:

Insurance, risk, financial impact, personal data.

Týden 11

Topic: Papers and electronic documents – definition, properties, security and authentication, electronic signature

After studying the chapter you will be able to:

  • Define the term electronic document
  • Describe the basic principles of electronic document protection
  • Explain the requirements of the eIDAS Regulation
Keywords:

Act, document, electronic document.

Týden 12

Topic: Data backup and recovery of system

After studying the chapter you will be able to:

  • Define types of backups
  • List methods of backups
  • Describe recovery software

Keywords:

Backup, recovery, plan, data.

Týden 13

Topic: The Biggest Cyber Threats of Recent Years

After studying the chapter you will be able to:

  • list the biggest cyber threats of recent years,
  • characterize the procedure of cyber threats investigation,
  • define the possible impacts of cyber threats in the context of today's societ.

Keywords:

Ransomware, phishing, social engineering, incident, investigation..