PV080 Information security and cryptography

Faculty of Informatics
Autumn 2020
Extent and Intensity
2/2. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (lecturer)
RNDr. Marek Kumpošt, Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
doc. Ing. Pavel Čeleda, Ph.D. (lecturer)
RNDr. Martin Ukrop, Ph.D. (lecturer)
Dr.-Ing. Lydia Kraus (lecturer)
JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer)
RNDr. Adam Janovský (seminar tutor)
RNDr. Agáta Kružíková, Ph.D. (seminar tutor)
Mgr. Karel Kubíček (seminar tutor), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
RNDr. Vladimír Sedláček, Ph.D. (seminar tutor)
RNDr. Martin Ukrop, Ph.D. (seminar tutor)
doc. RNDr. Jan Vykopal, Ph.D. (seminar tutor)
Mgr. Ondřej Borýsek (assistant)
Ing. Milan Brož, Ph.D. (assistant)
RNDr. Ján Jančár (assistant)
Mgr. Jan Kvapil (assistant)
RNDr. Vladimír Sedláček, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 8:00–9:50 A319
  • Timetable of Seminar Groups:
PV080/01: Thu 16:00–17:50 A403, A. Janovský, V. Sedláček, M. Sýs, M. Ukrop
PV080/02: Thu 14:00–15:50 A403, A. Janovský, V. Sedláček, M. Sýs, M. Ukrop
PV080/03: Thu 10:00–11:50 A403, A. Janovský, V. Sedláček, M. Sýs, M. Ukrop
Prerequisites
This course aims at students in their second years of study, getting them exposed to the elementary aspects of IT (cyber) security and cryptography - fundamentals of algebra and programming are therefore expected.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 36 student(s).
Current registration and enrolment status: enrolled: 4/36, only registered: 0/36, only registered with preference (fields directly associated with the programme): 0/36
fields of study / plans the course is directly associated with
there are 79 fields of study the course is directly associated with, display
Course objectives
The aim is to teach the students to:
explain the importance of information privacy and to illustrate negative impacts of its breach by examples;
show advantages or disadvantages of basic IT security and privacy methods;
judge impact of IT deployment on personal data and to judge ethical aspects of considered solutions;
explain the importance of proper ways to security from risk analysis, through security policy up to the development and management of mechanisms - namely those based on cryptography;
assess suitability of deploying selected tools for security and privacy support.
Learning outcomes
At the end of the course students will be able to:
explain the importance of information privacy and to illustrate negative impacts of its breach by examples;
show advantages or disadvantages of basic IT security and privacy methods;
judge impact of IT deployment on personal data and to judge ethical aspects of considered solutions;
explain the importance of proper ways to security from risk analysis, through security policy up to the development and management of mechanisms, namely of cryptographic algorithms;
assess suitability of deploying selected tools for security and privacy support.
Syllabus
  • Concept of information privacy and relevant technical aspects, IT influence and relations.
  • Protection of private data and legislation.
  • Cryptographic functions and protocols.
  • Digital identity, access management.
  • Ethics, professional behavior and maintenance of information.
  • Introduction to IT security.
  • Network security.
  • Secure programming.
  • Usable security.
  • Audit, revision of countermeasures, security operations.
  • Security standards, evaluation criteria.
Literature
    required literature
  • VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
Teaching methods
lecture, hands-on seminar, discussions both at lectures and in a dedicated forum in the IS
Assessment methods
Assignments (home work) related to seminars (about 1/3 of the final mark) and final exam.
Language of instruction
English
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Spring 2003, Spring 2005, Autumn 2005, Autumn 2006, Autumn 2007, Autumn 2008, Autumn 2009, Autumn 2010, Autumn 2011, Autumn 2012, Autumn 2013, Autumn 2014, Autumn 2015, Autumn 2016, Autumn 2017, Autumn 2018, Autumn 2019, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.
  • Enrolment Statistics (Autumn 2020, recent)
  • Permalink: https://is.muni.cz/course/fi/autumn2020/PV080