FI:PV080 Inf. security and cryptography - Course Information
PV080 Information security and cryptography
Faculty of InformaticsSpring 2023
- Extent and Intensity
- 2/2. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (lecturer)
RNDr. Marek Kumpošt, Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
doc. Ing. Pavel Čeleda, Ph.D. (lecturer)
RNDr. Martin Ukrop, Ph.D. (lecturer)
JUDr. Pavel Loutocký, Ph.D., BA (Hons) (lecturer)
Bc. Lukáš Bátora (seminar tutor)
Bc. Tamara Čierniková (seminar tutor)
RNDr. Antonín Dufka (seminar tutor)
Mgr. Lejla Džaferbegović (seminar tutor)
Ing. Katarína Galanská (seminar tutor)
Bc. Veronika Hanulíková (seminar tutor)
RNDr. Ján Jančár (seminar tutor)
RNDr. Adam Janovský (seminar tutor)
Mgr. Michael Koudela (seminar tutor)
RNDr. Agáta Kružíková, Ph.D. (seminar tutor)
Mgr. Jan Kvapil (seminar tutor)
Bc. Magdaléna Lišková (seminar tutor)
Mgr. Rudolf Lukáč (seminar tutor)
Tomáš Marek (seminar tutor)
Ivana Mišová (seminar tutor)
Mgr. Ondřej Pavlica (seminar tutor)
Mgr. Ádám Ruman (seminar tutor)
RNDr. Vojtěch Suchánek (seminar tutor)
doc. RNDr. Jan Vykopal, Ph.D. (seminar tutor)
Bc. Martin Zimka (seminar tutor)
Mgr. Pavol Žáčik (seminar tutor)
Mgr. Vojtěch Jelínek (assistant)
JUDr. Ing. František Kasl, Ph.D. (assistant) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Mon 13. 2. to Mon 15. 5. Mon 8:00–9:50 D1
- Timetable of Seminar Groups:
PV080/02: Wed 15. 2. to Wed 10. 5. Wed 10:00–11:50 B117, M. Koudela, I. Mišová
PV080/03: Mon 13. 2. to Mon 15. 5. Mon 12:00–13:50 B117, J. Jančár, M. Sýs
PV080/04: Thu 16. 2. to Thu 11. 5. Thu 12:00–13:50 B117, Á. Ruman, P. Žáčik
PV080/05: Tue 14. 2. to Tue 9. 5. Tue 8:00–9:50 B117, M. Sýs, M. Zimka
PV080/06: Thu 16. 2. to Thu 11. 5. Thu 18:00–19:50 B117, A. Janovský
PV080/07_TEMPORARY: Fri 17. 2. to Fri 12. 5. Fri 8:00–9:50 B117
PV080/08_TO_CANCEL: Wed 15. 2. to Wed 10. 5. Wed 14:00–15:50 B117
PV080/09: Tue 14. 2. to Tue 9. 5. Tue 18:00–19:50 B117, R. Lukáč, M. Sýs
PV080/10: Tue 14. 2. to Tue 9. 5. Tue 14:00–15:50 B117, L. Bátora, J. Kvapil
PV080/11: Tue 14. 2. to Tue 9. 5. Tue 10:00–11:50 B117, M. Sýs, M. Zimka
PV080/12: Thu 16. 2. to Thu 11. 5. Thu 16:00–17:50 B117, L. Džaferbegović, V. Suchánek
PV080/13: Wed 15. 2. to Wed 10. 5. Wed 18:00–19:50 B117, K. Galanská, A. Kružíková
PV080/14: Thu 16. 2. to Thu 11. 5. Thu 8:00–9:50 B117, T. Čierniková, V. Suchánek
PV080/15: Wed 15. 2. to Wed 10. 5. Wed 8:00–9:50 B117, M. Koudela, T. Marek
PV080/16: Tue 14. 2. to Tue 9. 5. Tue 16:00–17:50 B117, R. Lukáč, O. Pavlica
PV080/17_TEMPORARY: Tue 14. 2. to Tue 9. 5. Tue 12:00–13:50 B117
PV080/18: Thu 16. 2. to Thu 11. 5. Thu 14:00–15:50 B117, P. Žáčik
PV080/19: Mon 13. 2. to Mon 15. 5. Mon 16:00–17:50 B117, L. Džaferbegović, J. Jančár
PV080/20_TO_CANCEL: Wed 15. 2. to Wed 10. 5. Wed 12:00–13:50 B117
PV080/21: Fri 17. 2. to Fri 12. 5. Fri 10:00–11:50 B117, A. Dufka, M. Sýs - Prerequisites
- This course aims at students in their second year of study, getting them exposed to the elementary aspects of IT (cyber) security and cryptography - fundamentals of algebra and programming are therefore expected.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Image Processing and Analysis (programme FI, N-VIZ)
- Applied Informatics (programme FI, B-AP)
- Applied Informatics (programme FI, N-AP)
- Information Technology Security (eng.) (programme FI, N-IN)
- Information Technology Security (programme FI, N-IN)
- Bioinformatics and systems biology (programme FI, N-UIZD)
- Bioinformatics (programme FI, B-AP)
- Bioinformatics (programme FI, N-AP)
- Computer Games Development (programme FI, N-VIZ_A)
- Computer Graphics and Visualisation (programme FI, N-VIZ_A)
- Computer Networks and Communications (programme FI, N-PSKB_A)
- Cybersecurity Management (programme FI, N-RSSS_A)
- Economic Information Systems (programme ESF, B-SI)
- Formal analysis of computer systems (programme FI, N-TEI)
- Graphic design (programme FI, N-VIZ)
- Graphic Design (programme FI, N-VIZ_A)
- Hardware Systems (programme FI, N-PSKB_A)
- Hardware systems (programme FI, N-PSKB)
- Image Processing and Analysis (programme FI, N-VIZ_A)
- Information security (programme FI, N-PSKB)
- Information Systems (programme FI, N-IN)
- Informatics with another discipline (programme FI, B-EB)
- Informatics with another discipline (programme FI, B-FY)
- Informatics with another discipline (programme FI, B-GE)
- Informatics with another discipline (programme FI, B-GK)
- Informatics with another discipline (programme FI, B-CH)
- Informatics with another discipline (programme FI, B-IO)
- Informatics with another discipline (programme FI, B-MA)
- Informatics with another discipline (programme FI, B-TV)
- Informatics (eng.) (programme FI, D-IN4)
- Informatics (programme FI, B-INF) (2)
- Informatics (programme FI, D-IN4)
- Public Administration Informatics (programme FI, B-AP)
- Informatics in education (programme FI, B-IVV) (2)
- Information Security (programme FI, N-PSKB_A)
- Quantum and Other Nonclassical Computational Models (programme FI, N-TEI)
- Cybersecurity (programme FI, B-CS)
- Mathematical Informatics (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, N-IN)
- Computer graphics and visualisation (programme FI, N-VIZ)
- Computer Graphics and Image Processing (programme FI, B-IN)
- Computer Graphics (programme FI, N-IN)
- Computer Networks and Communication (programme FI, B-IN)
- Computer Networks and Communication (programme FI, N-IN)
- Computer Networks and Communications (programme FI, N-PSKB)
- Computer Systems and Technologies (eng.) (programme FI, D-IN4)
- Computer Systems and Technologies (programme FI, D-IN4)
- Computer Systems and Data Processing (programme FI, B-IN)
- Computer Systems (programme FI, N-IN)
- Principles of programming languages (programme FI, N-TEI)
- Programming and development (programme FI, B-PVA)
- Embedded Systems (eng.) (programme FI, N-IN)
- Programmable Technical Structures (programme FI, B-IN)
- Embedded Systems (programme FI, N-IN)
- Cybersecurity management (programme FI, N-RSSS)
- Services development management (programme FI, N-RSSS)
- Software Systems Development Management (programme FI, N-RSSS)
- Services Development Management (programme FI, N-RSSS_A)
- Service Science, Management and Engineering (eng.) (programme FI, N-AP)
- Service Science, Management and Engineering (programme FI, N-AP)
- Social Informatics (programme FI, B-AP)
- Software Systems Development Management (programme FI, N-RSSS_A)
- Software Systems (programme FI, N-PSKB_A)
- Software systems (programme FI, N-PSKB)
- Machine learning and artificial intelligence (programme FI, N-UIZD)
- Theoretical Informatics (programme FI, N-IN)
- Teacher of Informatics and IT administrator (programme FI, N-UCI)
- Informatics for secondary school teachers (programme FI, N-UCI) (2)
- Upper Secondary School Teacher Training in Informatics (programme FI, N-SS) (2)
- Artificial Intelligence and Natural Language Processing (programme FI, B-IN)
- Artificial Intelligence and Natural Language Processing (programme FI, N-IN)
- Computer Games Development (programme FI, N-VIZ)
- Processing and analysis of large-scale data (programme FI, N-UIZD)
- Image Processing (programme FI, N-AP)
- Natural language processing (programme FI, N-UIZD)
- Course objectives
- The aim is to teach the students to:
explain the importance of information privacy and to illustrate negative impacts of its breach by examples;
show advantages or disadvantages of basic IT security and privacy methods;
judge impact of IT deployment on personal data and to judge ethical aspects of considered solutions;
explain the importance of proper ways to security from risk analysis, through security policy up to the development and management of mechanisms - namely those based on cryptography;
assess suitability of deploying selected tools for security and privacy support. - Learning outcomes
- At the end of the course students will be able to:
explain the importance of information privacy and to illustrate negative impacts of its breach by examples;
show advantages or disadvantages of basic IT security and privacy methods;
judge impact of IT deployment on personal data and to judge ethical aspects of considered solutions;
explain the importance of proper ways to security from risk analysis, through security policy up to the development and management of mechanisms, namely of cryptographic algorithms;
assess suitability of deploying selected tools for security and privacy support. - Syllabus
- Concept of information privacy and relevant technical aspects, IT influence and relations.
- Protection of private data and legislation.
- Cryptographic functions and protocols.
- Digital identity, access management.
- Ethics, professional behavior and maintenance of information.
- Fundamental IT security concepts, attacker models.
- Network security.
- Secure programming.
- Usable security.
- Audit, risk assessment, security operations.
- Security standards, evaluation criteria.
- Literature
- required literature
- VAN OORSCHOT, Paul C. Computer security and the Internet : tools and jewels. Cham: Springer, 2020, xxiii, 365. ISBN 9783030336486. info
- Teaching methods
- lecture, hands-on seminar, discussions both at lectures and in a dedicated forum in the IS, assignments (home work)
- Assessment methods
- Assignments (home work) related to seminars (about 30% of the final mark), scores from short pre-seminar tests (about 10%), and final exam (about 60%).
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
- Enrolment Statistics (Spring 2023, recent)
- Permalink: https://is.muni.cz/course/fi/spring2023/PV080