Communication System Security
FEKT-MPC-BKSAcad. year: 2020/2021
Modern civilization depends on a correct functioning of information systems. Significant attention must therefore be paid to the security of these systems. On completing the course, students will have a thorough overview of possible methods of securing an information system. Lectures are mainly dedicated to explaining the functioning of cryptography protections, communication protections, access control techniques, and computer protections. Exercises are computational ones and are dedicated to strengthening the theoretical knowledge and to considering quantitatively the different types of protection.
Learning outcomes of the course unit
A student who completes the course will be able to:
• explain the principles of symmetric cryptosystems,
• explain the principles of asymmetric cryptosystems,
• explain the principles of the functioning of communication protections,
• explain the principles of the functioning of access control systems,
• explain the principles of the functioning of computer protections,
• explain the principles of emission protections,
• explain the principles of security evaluation.
No special knowledge is required.
Recommended optional programme components
Recommended or required reading
BURDA K.: Bezpečnost informačních systémů. Vysoké učení technické v Brně, Brno 2013. (CS)
ROSS J. A.: Security Engineering. Wiley Publishing, Indianopolis, 2008. (EN)
BURDA, K.: Aplikovaná kryptografie. VUTIUM, Brno 2013. (CS)
Planned learning activities and teaching methods
Techning methods include lectures and numerical excercises. Course is taking advantage of e-learning system.
Assesment methods and criteria linked to learning outcomes
20 points can be obtained for fulfilling the tasks in computational exercises and 80 points can be obtained for the examination. The examination is a written one and it is to check whether the student is able to explain the principles of different types of securing information systems.
Language of instruction
1. Basic terms.
2. Symmetric cryptosystems.
3. Asymmetric cryptosystems.
4. Protocols for secure communication.
5. Codes for error detection and correction.
6. Protection of communication channels.
7. Hidding communication.
8. Access control.
9. Computer security.
10. Data backup.
11. Information security evaluation.
12. Emission security.
1. Exercise to the secrecy theory.
2. Exercise to symmetric cryptosystems.
3. Exercise to asymmetric cryptosystems.
4. Exercise to cryptography computations.
5. Exercise to codes for error detection and correction.
6. Exercise to communication channel protections.
7. Exercise to the hidding communication.
8. Exercise to access control systems.
9. Exercise to ECC techniques.
10. Exercise to data backups.
11. Exercise to the information security evaluation.
12. Credit exercise.
The goal of the course is to provide students with a good insight into the branch of information system security.
Specification of controlled education, way of implementation and compensation for absences
Computational exercises are obligatory.