FF:VIKBB39 Information Security - Course Information
VIKBB39 Information Security
Faculty of ArtsSpring 2016
- Extent and Intensity
- 1/1/0. 3 credit(s). Type of Completion: k (colloquium).
- Teacher(s)
- PhDr. Pavla Vizváry, Ph.D. LL.M. (lecturer)
- Guaranteed by
- PhDr. Petr Škyřík, Ph.D.
Division of Information and Library Studies – Department of Czech Literature – Faculty of Arts
Contact Person: Mgr. Alžběta Šašinková, Ph.D.
Supplier department: Division of Information and Library Studies – Department of Czech Literature – Faculty of Arts - Timetable
- Thu 10:50–12:25 M11
- Prerequisites
- The subject builds on knowledge appropriate courses of Digital competences and Internet tools (it is necessary to attend these courses, or have matching knowledge).
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30 - fields of study / plans the course is directly associated with
- Information and Library Studies (programme FF, B-IS) (2)
- Course objectives
- At the end of the course students should be able to: define the basic current problems of information safety with emphasis on social aspects; interpret and analyse concrete real problems; explain factors which influenced the development in this domain; create logic arguments in discussion about the problems, their importance and possible solutions. The whole subject is not focused on the technical security, rather safe behavior using IT, evaluation of the credibility of information resources and the societal implications of information threats.
- Syllabus
- 1. Conditions of completion of the course, defining issues, information resources about information safety
- 2. Social engineering and criteria for evaluating the credibility of information and information resources
- 3. Inappropriate and illegal content: extremist movements and religious cult
- 4. Inappropriate and illegal content: copyright and pornography; IT addiction
- 5. Misusable of personal information on the Internet and their searching
- 6. Malware and junk messages
- 7. Cyberbullying, sexting, grooming
- 8. E-commerce and its safety
- 9. Safe behaviour and identity protection
- 10. Basics of cryptology and its current using
- 11. Security of hardware and software
- 12. Information policy of organization in terms of safety
- 13. Information policy of state in terms of safety
- Literature
- recommended literature
- ERICKSON, Jon. Hacking : umění exploitace. Translated by Jan Pokorný. 2., upr. a dopl. vyd. Brno: Zoner Press, 2009, 544 s. ISBN 9788074130229. info
- SINGH, Simon. Kniha kódů a šifer : tajná komunikace od starého Egypta po kvantovou kryptografii. Translated by Petr Koubský - Dita Eckhardtová. Druhé vydání v českém j. Praha: Argo, 2009, 382 stran. ISBN 9788025701447. info
- LONG, Johnny. Google hacking. Vyd. 1. Brno: Zoner Press, 2005, xviii, 472. ISBN 8086815315. info
- THOMAS, Thomas M. Zabezpečení počítačových sítí bez předchozích znalostí. Vyd. 1. Brno: CP Books, 2005, 338 s. ISBN 8025104176. info
- DOSEDĚL, Tomáš. Počítačová bezpečnost a ochrana dat. Vyd. 1. Brno: Computer Press, 2004, ix, 190. ISBN 8025101061. info
- MITNICK, Kevin and William SIMON. Umění klamu. Gliwice: Helion, 2003, 348 s. ISBN 83-7361-210-6. info
- Teaching methods
- 1. Theory to the subject is available in e-learning course in Elf. 2. Attendance at weekly meetings is compulsory for full-time students. The basic theory clarification of topics proceeds in the begining. The greater part is a discussion. It is based on active learning methods and read resources (students find themselves seven articles during the semester and they inform the other about their content). This makes attendance mandatory. Combined students can attending of seminars place for an additional task. 3. Individual task is required to try gained skills. 4. Colloquium is held during the exam period to verify the acquired knowledge.
- Assessment methods
- Aktive role in class discussions during lectures or special task; elaboration of an individual task (problem solving); final group discussion.
- Language of instruction
- Czech
- Further comments (probably available only in Czech)
- Study Materials
The course is taught each semester.
Information on the extent and intensity of the course: podle počtů kreditů.
- Enrolment Statistics (Spring 2016, recent)
- Permalink: https://is.muni.cz/course/phil/spring2016/VIKBB39