Course detail

User Security in ICT Systems

FEKT-XIBUAcad. year: 2017/2018

Course will cower following topics:
• Internet and legislation (IP rigts law, use of legal software, downloading, privacy protection)
• Secure behavior on th einternet (how to prevent phising, hoaxes and spam, use of anti-viruses and firewalls)
• Electronic signature, secure identity, password management

Learning outcomes of the course unit

After completition of the course, students will be able:
- to use their PC and other ICT equippment in a secure manner and to describe typical security threats and means of protection
- to manage their passwords securely and to explain basing password management rules
- to describe basic rules to protect their identity on social networks
- to explain how to use e-mail securely

Prerequisites

Basic knowledge of PC use is required.

Co-requisites

Not applicable.

Recommended optional programme components

Not applicable.

Recommended or required reading

Not applicable.

Planned learning activities and teaching methods

Evaluation of study results follows the Rules for Studies and Examinations of BUT.

Assesment methods and criteria linked to learning outcomes

Requirements for successful completion of the subject are specified by guarantor’s regulation updated for every academic year.

Language of instruction

Czech, English

Work placements

Not applicable.

Course curriculum

PART 1
Introduction to security.
Cybercrime, malicious code and protection.
Spam and e-mail, protection of e-identity, web based threats.
PART 2
Social networks, industrial espionage.
Organizational security, law and legislation.
HW means of protection, outlook to future.

Aims

After passing the course students will be able to use network devices securely, they will learn how to defend their PC against most common attacks. Moreover they will be introduced to best practices regarding password maintanance, methods of securing e-mail messages and will learn how to be safe on the social networks. Part of the course is also devoted to legal aspects of IP rigts and their protection on internet.

Specification of controlled education, way of implementation and compensation for absences

The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.

Classification of course in study plans

  • Programme EEKR-B Bachelor's

    branch B-AMT , 1. year of study, winter semester, 3 credits, general knowledge
    branch B-EST , 1. year of study, winter semester, 3 credits, general knowledge
    branch B-MET , 1. year of study, winter semester, 3 credits, general knowledge
    branch B-SEE , 1. year of study, winter semester, 3 credits, general knowledge
    branch B-TLI , 1. year of study, winter semester, 3 credits, general knowledge

  • Programme BTBIO-A Bachelor's

    branch A-BTB , 2. year of study, winter semester, 3 credits, general knowledge

  • Programme EEKR-B Bachelor's

    branch B-AMT , 2. year of study, winter semester, 3 credits, general knowledge
    branch B-EST , 2. year of study, winter semester, 3 credits, general knowledge
    branch B-MET , 2. year of study, winter semester, 3 credits, general knowledge
    branch B-SEE , 2. year of study, winter semester, 3 credits, general knowledge
    branch B-TLI , 2. year of study, winter semester, 3 credits, general knowledge

  • Programme BTBIO-A Bachelor's

    branch A-BTB , 3. year of study, winter semester, 3 credits, general knowledge

  • Programme EEKR-B Bachelor's

    branch B-AMT , 3. year of study, winter semester, 3 credits, general knowledge
    branch B-EST , 3. year of study, winter semester, 3 credits, general knowledge
    branch B-MET , 3. year of study, winter semester, 3 credits, general knowledge
    branch B-SEE , 3. year of study, winter semester, 3 credits, general knowledge
    branch B-TLI , 3. year of study, winter semester, 3 credits, general knowledge

Type of course unit

 

Exercise

26 hours, optionally

Teacher / Lecturer