SYLLABUS | |||||||||||||||
University: Technical University of Košice | |||||||||||||||
Faculty: Faculty of Electrical Engineering and Informatics | |||||||||||||||
Department: Department of Computers and Informatics |
|||||||||||||||
Course Number: 2616041 | Course Name: Security in computer systems | ||||||||||||||
Type, scope and method of learning activities: Course Type: Lecture, Laboratory exercise Recommended scope of the course content (in hours): Full-time study (hours per week): 2,2 Part-time study (hours per semester): 26,26 Study Method: |
|||||||||||||||
Number of credits: 6 | |||||||||||||||
Recommended semester of study: ST | |||||||||||||||
Recommended semester | Study programme | Study grade | Study Method | ||||||||||||
3.rok ST | Informatics (INF_Bc_D_sk) Informatics (INF_Bc_D_en) |
Bachelor Bachelor |
Attendance Attendance |
||||||||||||
Level of study: | |||||||||||||||
Prerequisites: | |||||||||||||||
Course completion requirements: Assessment and completion of the course: Credit test and examination Continuous assessment: Student passes the continuous assessment and receives credits when he or she meets the requirement to obtain at least 21% out of 40%. project Final assessment: Student passes the final assessment and passes the examination when he or she meets the requirement to obtain at least 31% out of 60%. exam Overall assessment: Overall assessment is the sum of the assessments obtained by students in the assessment period. The overall result is determined in accordance with the internal regulations of the Technical University in Košice. (Study Regulations, the internal regulation principles of doctoral studies) |
|||||||||||||||
Learning outcomes: Student gets basic knowledge about methods and concepts of confidentiality, integrity and computer systems resources availability. Student gets knowledge to design secure information systems and auditing computer security. |
|||||||||||||||
Brief course content: 1. Computer Security Problems 2. Introduction to Cryptography 3. Identification and Authentication 4. Access Control 5. Malware 6. Email Security 7. Security Management |
|||||||||||||||
Recommended Reference Sources: 1. Charles P. Pfleeger. Security in Computing. Prentice Hall 2002 2. Dieter Gollmann. Computer Security. Wiley 1999 3. William Stallings, Cryptography and Network Security Principles and Practices, Prentice Hall 2005. |
|||||||||||||||
Recommended optional program components: |
|||||||||||||||
Languages required for the course completion: | |||||||||||||||
Notes: | |||||||||||||||
Course assessment: Total number of students assessed: 2403 |
|||||||||||||||
A | B | C | D | E | FX | ||||||||||
8% | 14% | 22% | 31% | 20% | 5% | ||||||||||
Teacher: prof. Ing. Liberios Vokorokos, PhD. doc. Ing. Anton Baláž, PhD. |
|||||||||||||||
Last modified: 01.09.2022 | |||||||||||||||
Approved by: person(s) responsible for the study program | |||||||||||||||