Information Systems Safety and Security |
Abbreviation: SZINKS
|
Load: 30(L)
+ 0(E)
+ 15(LE)
+ 15(S)
+ 0(FLE)
+ 0(PEE)
|
Lecturers in charge: |
dr. sc. Dragan Peraković |
Lecturers: |
dr. sc. Ivan Cvitić
(
Laboratory exercises, Seminar
)
|
Course description: Elements of information and communication system. Types and sources of threats to the information and communication system.
Motives and profiles of malicious users. Security of information and communication system. Models and methods of information
and communication system protection - legal, physical, technical. Security of terminal device application. Identification
and classification of terminal device security threats. Organizational security measures - supervision and management of security
systems, validation of implemented security methods. Legal aspects of information and communication systems security. Cryptology.
Introduction to e-Forensics. Metrics, control and audit of information and communication system security. Security challenges
of new information and communication concepts.
|
Compulsory literature: |
1. |
Peraković, D., Cvitić, I.: Sigurnost i zaštita informacijsko komunikacijskog sustava, Fakultet prometnih znanosti, Zagreb,
2020., nastavni tekst, publicirano u digitalnom obliku na Internet poslužitelju na adresi: https://moodle.srce.hr/
|
2. |
Cvitić, I.: Autorizirani materijali za seminar i laboratorijske vježbe (dostupno putem Merlin sustava na: https://moodle.srce.hr/) |
3. |
Bača, M.: Uvod u računalnu sigurnost, Narodne novine d.d., Zagreb 2004., ISBN 953-234-030-0 |
4. |
Furnel, S.: Securing information and communications systems, principles, technologies and applications, Artech House Inc.,
London, UK, 2008., ISBN 978-1-59693-2
|
Recommended literature: |
5. |
Kahate, A.: Cryptology and Network Security (Second Edition), Tata McGrawe-Hill, 2008., ISBN 0-07-015145-8 |
6. |
Macaulay, T.: RIoT Control: Understanding and Managing Risks and the Internet of Things 1st Edition, Moragan Kaufmann, 2016. |
7. |
Kahate, A.: Cryptology and Network Security (Second Edition), Tata McGrawe-Hill, 2008., ISBN 0-07-015145-8 |
8. |
Stuart, J.: Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
(IEEE Press Series on Information and Communication Networks Security) 2nd Edition, Wiley-IEEE Press, 2016.
|
9. |
Broad, J., Bindner, A.: Hacking With Kali (Practical Penetration Testing Techniques), Syngress, 2014., ISBN 978-0-12-407749-2 |
10. |
Winkler, V.: Securing the Cloud (Cloud Computing Security Tehniques and Tactics), Syngress, 2011., ISBN 978-1-59749-592-9 |
11. |
Nacionalna strategija kibernetičke sigurnosti i akcijskog plana za provedbu nacionalne strategije kibernetičke sigurnosti,
Vlada Republike Hrvatske, 2015.
|
12. |
Zakon o informacijskoj sigurnosti, Republika Hrvatska, Sabor Republike Hrvatske, 2007. |
|