Code: BIE-UKB.21 |
Introduction to Cybersecurity |
Lecturer: Ing. Jan Bělohoubek Ph.D. |
Weekly load: 3P+1C |
Completion: A, EX |
Department: 18106 |
Credits: 5 |
Semester: W |
- Description:
-
The goal of the course is to provide students with the introduction of basic concepts in modern approach to cybersecurity. Students will get a basic overview of threats in cyberspace and attacker techniques, security mechanisms in networks, operating systems and applications, as well as of basic cyberspace regulations.
- Contents:
-
1. Introduction, definition of cybersecurity and basic concepts.
2. Threat modeling, adversarial profile, threat intelligence.
3. Cybercrime and its economics.
4. Cyberrisk management.
5. Protocols in cyber security.
6. Network security.
7. Operating systems security, security aspects of operating system level virtualization.
8. Web and mobile security.
9. Security development lifecycle, introduction to concepts of application security.
10. Cyberphysical systems, Internet of Things.
11. Critical infrastructure, industrial control systems
12. Cybersecurity and privacy.
13. Law and regulations in cyberspace.
- Seminar contents:
-
1. Threat Modelling, Data Flow Diagrams, Threat Modelling assignment
2. Risk management concepts
3. Attacks on network layer
4. Web application attacks
5. Privacy considerations, privacy domains, practical privacy analysis
- Recommended literature:
-
1. Anderson R. : Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, 2008. ISBN 978-0-470-06852-6.
2. Wheeler E. : Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. Syngress, 2011. ISBN 978-1597496155.
3. Stallings W. : Effective Cybersecurity: A Guide to Using Best Practices and Standards. Addison-Wesley Professional, 2018. ISBN 978-0134772806.
4. Adnress J. : Foundations of Information Security. No Starch Press, 2019. ISBN 978-1718500044.
5. Cunningham Ch. : Cyber Warfare ? Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare. Packt Publishing, 2020. ISBN 978-1839216992.
- Keywords:
- cybersecurity, information security, network security, threat modelling
Abbreviations used:
Semester:
- W ... winter semester (usually October - February)
- S ... spring semester (usually March - June)
- W,S ... both semesters
Mode of completion of the course:
- A ... Assessment (no grade is given to this course but credits are awarded. You will receive only P (Passed) of F (Failed) and number of credits)
- GA ... Graded Assessment (a grade is awarded for this course)
- EX ... Examination (a grade is awarded for this course)
- A, EX ... Examination (the award of Assessment is a precondition for taking the Examination in the given subject, a grade is awarded for this course)
Weekly load (hours per week):
- P ... lecture
- C ... seminar
- L ... laboratory
- R ... proseminar
- S ... seminar