Protection and Security of Information Systems

Data is displayed for academic year: 2023./2024.

Lectures

Course Description

The objective of the course is to get to know the principles of information security, risks and threats to information systems, methods of their protection, and procedures for measuring, evaluating and certifying the achieved level of information security. In order to implement this content, procedures and methods for risk assessment, management and control that breach the confidentiality, integrity and availability of information systems are considered. Norms to establish information security and revision of IS security will be explained. Models of security management and control of process flows are specially elaborated as a basis for realization of safety mechanisms. Security mechanisms and security architecture related to databases, distributed databases and e-business systems, as well as standards, procedures for building and evaluating confidential systems are discussed.

Study Programmes

University graduate
[FER3-HR] Audio Technologies and Electroacoustics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Communication and Space Technologies - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Computational Modelling in Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Computer Engineering - profile
Elective Course of the Profile (1. semester)
Elective Courses (1. semester) (3. semester)
Elective Courses of the Profile (3. semester)
[FER3-HR] Computer Science - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Control Systems and Robotics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Data Science - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electrical Power Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electric Machines, Drives and Automation - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electronic and Computer Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electronics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Information and Communication Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Network Science - profile
Elective Courses (1. semester) (3. semester)
Elective Courses of the Profile (1. semester) (3. semester)
[FER3-HR] Software Engineering and Information Systems - profile
Elective Course of the profile (3. semester)
Elective Course of the Profile (1. semester)
Elective Courses (1. semester) (3. semester)
[FER2-HR] Computer Engineering - profile
Specialization Course (1. semester) (3. semester)
[FER2-HR] Information Processing - profile
Specialization Course (1. semester) (3. semester)
[FER2-HR] Software Engineering and Information Systems - profile
Specialization Course (1. semester) (3. semester)

Learning Outcomes

  1. assess information security risks
  2. explain technical, organizational and human factors that are related to information security risks
  3. explain application of norms to establish information security
  4. define threats, vulnerabilities and attack that threaten informtion systems and the organization
  5. explain analysis and application of technological solutions to build information security architecture
  6. explain ways to establish and maintain information system management system
  7. assess influence of security policies, legal framework, compliance requirements and market development on complex systems and organization mission
  8. To get the know the methods for database security.
  9. To get to know the methods for protection and security of e-business systems.

Forms of Teaching

Lectures

2 hours a week

Week by Week Schedule

  1. Information system security management
  2. Information system security management
  3. Information system security standards
  4. Information system security standards
  5. Secure development life-cycle
  6. IS risk analysis and management
  7. Threat modelling
  8. Midterm exam
  9. Contingency and continuity planning
  10. Database Security
  11. Database security
  12. IS auditing
  13. Electronic business security
  14. Legal and ethical issues
  15. Final exam

Literature

Tipton, Harold F., and Micki Krause Nozaki (2007.), Information security management handbook, CRC press
S. Castano, M.G. Fugini, G. Martella, P. Samarati (1995.), Database Security, ACM Press

For students

General

ID 223741
  Winter semester
5 ECTS
L1 English Level
L1 e-Learning
30 Lectures
0 Seminar
0 Exercises
0 Laboratory exercises
0 Project laboratory
0 Physical education excercises

Grading System

87.5 Excellent
75.0 Very Good
62.5 Good
50.0 Sufficient