P017 Information Technology Security

Faculty of Informatics
Autumn 2001
Extent and Intensity
3/0. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc.
Timetable
Wed 7:00–9:50 D1
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Syllabus
  • Security, security policy, security enforcing functions, security mechanisms. Disaster recovery planning.
  • Conventional encryption.
  • Confidentiality using convetional encryption.
  • Public-key cryptology.
  • Digital Signatures.
  • Identifiction and authentication, protocols, KERBEROS.
  • Access control.
  • Security evaluation criteria.
  • Formal methods and security models.
Literature
  • STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
Language of instruction
Czech
Further Comments
The course is taught annually.
The course is also listed under the following terms Autumn 1995, Autumn 1996, Autumn 1997, Autumn 1998, Autumn 1999, Autumn 2000.

P017 Information Technology Security

Faculty of Informatics
Autumn 2000
Extent and Intensity
3/0. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Syllabus
  • Security, security policy, security enforcing functions, security mechanisms. Disaster recovery planning.
  • Conventional encryption.
  • Confidentiality using convetional encryption.
  • Public-key cryptology.
  • Digital Signatures.
  • Identifiction and authentication, protocols, KERBEROS.
  • Access control.
  • Security evaluation criteria.
  • Formal methods and security models.
Literature
  • STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
Language of instruction
Czech
Further Comments
The course is taught annually.
The course is taught: every week.
The course is also listed under the following terms Autumn 1995, Autumn 1996, Autumn 1997, Autumn 1998, Autumn 1999, Autumn 2001.

P017 Information Technology Security

Faculty of Informatics
Autumn 1999
Extent and Intensity
3/0. 3 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. Ing. Jan Staudek, CSc.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Syllabus
  • Security, security policy, security enforcing functions, security mechanisms. Disaster recovery planning.
  • Conventional encryption.
  • Confidentiality using convetional encryption.
  • Public-key cryptology.
  • Digital Signatures.
  • Identifiction and authentication, protocols, KERBEROS.
  • Access control.
  • Security evaluation criteria.
  • Formal methods and security models.
Literature
  • STALLINGS, William. Cryptography and network security :principles and practice. 2nd ed. Upper Saddle River: Prentice Hall, 1999, xvii, 569. ISBN 0-13-869017-0. info
Language of instruction
Czech
Further Comments
The course is taught annually.
The course is taught: every week.
The course is also listed under the following terms Autumn 1995, Autumn 1996, Autumn 1997, Autumn 1998, Autumn 2000, Autumn 2001.

P017 Information Technology Security

Faculty of Informatics
Autumn 1998
Extent and Intensity
3/0. 3 credit(s). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
Contact Person: doc. Ing. Jan Staudek, CSc.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Syllabus
  • Security, security policy, security enforcing functions, security mechanisms. Disaster recovery planning.
  • Conventional encryption.
  • Confidentiality using convetional encryption.
  • Public-key cryptology.
  • Digital Signatures.
  • Identifiction and authentication, protocols, KERBEROS.
  • Access control.
  • Security evaluation criteria.
  • Formal methods and security models.
Language of instruction
Czech
Further Comments
The course is taught annually.
The course is taught: every week.
The course is also listed under the following terms Autumn 1995, Autumn 1996, Autumn 1997, Autumn 1999, Autumn 2000, Autumn 2001.

P017 Information Technology Security

Faculty of Informatics
Autumn 1997
Extent and Intensity
3/0. 3 credit(s). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
Contact Person: doc. Ing. Jan Staudek, CSc.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Syllabus
  • Security, security policy, security enforcing functions, security mechanisms. Disaster recovery planning.
  • Conventional encryption.
  • Confidentiality using convetional encryption.
  • Public-key cryptology.
  • Digital Signatures.
  • Identifiction and authentication, protocols, KERBEROS.
  • Access control.
  • Security evaluation criteria.
  • Formal methods and security models.
Language of instruction
Czech
The course is also listed under the following terms Autumn 1995, Autumn 1996, Autumn 1998, Autumn 1999, Autumn 2000, Autumn 2001.

P017 Information Technology Security

Faculty of Informatics
Autumn 1996
Extent and Intensity
3/0. 3 credit(s). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
Contact Person: doc. Ing. Jan Staudek, CSc.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Syllabus
  • Security, security policy, security enforcing functions, security mechanisms. Disaster recovery planning.
  • Conventional encryption.
  • Confidentiality using convetional encryption.
  • Public-key cryptology.
  • Digital Signatures.
  • Identifiction and authentication, protocols, KERBEROS.
  • Access control.
  • Security evaluation criteria.
  • Formal methods and security models.
Language of instruction
Czech
The course is also listed under the following terms Autumn 1995, Autumn 1997, Autumn 1998, Autumn 1999, Autumn 2000, Autumn 2001.

P017 Information Technology Security

Faculty of Informatics
Autumn 1995
Extent and Intensity
0/0. 3 credit(s). Recommended Type of Completion: k (colloquium). Other types of completion: z (credit).
Teacher(s)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
Contact Person: doc. Ing. Jan Staudek, CSc.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
Syllabus
  • Security, security policy, security enforcing functions, security mechanisms. Disaster recovery planning.
  • Conventional encryption.
  • Confidentiality using convetional encryption.
  • Public-key cryptology.
  • Digital Signatures.
  • Identifiction and authentication, protocols, KERBEROS.
  • Access control.
  • Security evaluation criteria.
  • Formal methods and security models.
Language of instruction
Czech
The course is also listed under the following terms Autumn 1996, Autumn 1997, Autumn 1998, Autumn 1999, Autumn 2000, Autumn 2001.
  • Enrolment Statistics (recent)