Terms for 2017
Open DayFull list of terms
Data protection and security
The aim of this course is to introduce students to the fundamental aspects of data, the starting point is the concept of integrated protection of information systems.
What are you going to learn
Information Security Management System
Network security and PKI
How the course is organized
Full time study
The course consists of 12 lectures, each lasting 1,5 hours.
Part time study
The course consists of 3 tutorials, each lasting 3 hours.
STALLINGS, W., BROWN, L.: Computer Security: Principles and Practice, Prentice Hall, 2011.
STONEBURNER, G., GOGUEN, A., FERINGA, A.: Risk Management Guide for Information Technology Systems, Nist U.S., 2002.
WYLDER, J.: Strategic Information Security, CRC Press, 2004.
TIPTON, H. F., KRAUSE, M. (eds.): Information Security Management Handbook, 6the edition, CRC Press, 2009.
STINSON, D.R.: Cryptography Theory and Practice, third edition, Chapman Hall/CRC, 2006.