General Data

Code: 62M131
Number of credits: 6.00
ISCED-F: Information and Communication Technologies (ICTs), Information and Communication Technologies (ICTs) not further defined
Status: Optional
Type: Course
Academic Year:
Term:
Modality: Workbased
Languages: English
Available for Mobility Students: Yes

Coordination

izr. prof. dr. MUHAMED TURKANOVIĆ

Description

The objective of the course is to prepare students to know and understand the field of security and protection of computer and information systems and computer networks from an organizational and management perspective. It is also intended to prepare students to be able to analyze risks and take appropriate measures to secure information / computer systems in network environments and on the Internet.

Requirements

Recommended basic knowledge/understanding of mathematics, computer architectures, operating systems, informatics and networks.

Instructors

red. prof. dr. BOŠTJAN BRUMEN

red. prof. dr. TATJANA WELZER DRUŽOVEC

Contents

  • Introductory chapters on security and the aim for assuring security. 
  • Principles and approaches 
  • Attacks and threats in network environments 
  • Authentication procedures and technologies in network environment 
  • Public key infrastructure 
  • Security services in web 
  • Digital signatures 
  • Malware, spam 
  • Backups and archives 
  • Standards and Management of Security 
  • Security Policies 
  • Privacy, Ethic and Legal issues in Security 
  • Role, significance, awareness and implementation of education of information security

Learning Outcomes

  • understand the threats, risks, vulnerabilities and the impact of attacks on information systems on networks or on the Internet and network environments 
  • analyze threats, risks and vulnerabilities 
  • assess the level of threat, risk and weaknesses 
  • identify cyberattacks 
  • choose appropriate safeguards and countermeasures 
  • use appropriate safeguards and countermeasures (protocols and mechanisms for protecting network connections) 
  • design comprehensive plans for the protection of wireless connections and networks and the security of the information system 
  • design a security policy 
  • analyze and assess importance of legal and ethical issues of information security 
  • choose appropriate level of privacy

Planned Activities

  • lectures, 
  • lab work.

Assessment Methods and Criteria

  • Written examination: 50%
  • Laboratory work: 50%