Topics of lectures and exercises: - Cryptography repetorium. Symmetric and asymmetric cryptosystems. Hashing, key generators and Diffie-Hellman functions. Cryptographic variables. - Electronic signature, electronic signature generation and verification. Certificates, PKI, legal aspects. - Transmission systems. Security in application, transport, network and link layer. Electronic mail security, IKE, DNSsec, TLS, SSH, IPSec, MACsec, WPA. TOR network. - Access systems. Authentication, protocols BAA, DAA, EAP, Kerberos. Authorization protocols Oauth, RADIUS. - Payment systems. 3Dsecure protocol. Payment cards. Cryptocurrencies, Bitcoin. - Definition of cybersecurity concepts. Risk, asset, vulnerability. Threat, security event, incident, attack, crime. Legislative, organizational, technical measures. - Physical security, access control, protection of systems and infrastructure. - LAN protection, interface protection. Firewalls, proxy servers, application security. - Legislative aspects. Existing legal standards and their development. Law on cyber security. Definition of cybercrime. - Identification of cybercrime. Botnet, Malware, Ransomware, Scam, Phishing, theft of intellectual property. DoS, Ddos and other attacks. Identity Theft.
|
-
KOLOUCH, J., BAŠTA, P., et al. CyberSecurity. CZ.NIC, 2019. ISBN 978-80-88168-31-7.
-
KOLOUCH, J. CyberCrime. CZ.NIC, 2019. ISBN 978-80-88168-31-7.
-
PETERKA, Jiří. Báječný svět elektronického podpisu. Praha: CZ.NIC, 2011. ISBN 978-80-904248-3-8.
-
SCHNEIER, B. Applied Cryptography, Protocols, Algorithms and source code in C. John Wiley & Sons, 2015. ISBN 978-1119096726.
|