translated by Google

Machine-translated page for increased accessibility for English questioners.

CSC questions

Single-subject study plan

Technology and security

  1. Computer systems. Numerical systems, relations between systems, computer display of integers, arithmetic. Codes, internal, external, detection and correction. Processors, their parameters and architectures. Internal and external memories and principles of their function. Computer input and output devices and their connection. (PB150)
  2. Operating system. Operating system architecture, kernel architecture, basic processor modes. Programming interfaces, libraries. User, access rights, virtualization. Virtual memory, process and page tables. Thread, thread and process planning. Concurrency, deadlocks, resource allocation. Process creation and program execution in POSIX systems, copy-on-write. (PB152, PV004)
  3. File systems. Block device, block layer, I / O scheduler, RAID, disk encryption. Ordinary files, free space allocation, fragmentation. Directory structure and its representation on disk. Input and output mapped to memory. (PB152, PV004)
  4. Networks. Computer network layer models (ISO / OSI, TCP / IP). functionality and interoperability of layers, addressing. Physical layer, signals and their coding, media access control. Interconnection of computer networks. Network protocols, switching and routing, multicast. Secured data transfer, connection setup and termination. Transport protocols. (PB156)
  5. Network applications and security. Basic application protocols: mail delivery, file transfer, web, name service. Principles of description and quality assurance of service, use for multimedia. Security of network communication, authentication and encryption, security on individual protocol layers. (PB156)
  6. Principles of programming. Structured programming in imperative language. Program memory model; memory management, dynamic allocation, work with user data structures. Low-level work with memory, pointer, field and pointer arithmetic. Ways of debugging the program. Secure programming and SW development. (PB071, PV080)
  7. Database. Relational model, relational schema, keys of relational schemas, integrity constraints, relational algebra, connection of relations. SQL query language (select statement, relation joins, aggregation functions). Query processing. Basic principles, example. Indexing. Transaction. Properties of transaction processing. (PB168)
  8. Software and information systems Development and operation of software systems. Use of UML in software development. Applied information systems. Architectures of large-scale information systems. Methods of leading large projects. IS operation management. (PB007, PV028)
  9. Basic security functions and their provision - confidentiality, integrity, availability, non-repudiation of origin. Security organization and management, security policies and procedures. Cybersecurity management structure, roles, responsibilities and competencies. Security Maturity Model. (PV080)
  10. Risk analysis and management. Asset management, risk analysis, measures against risks and their effectiveness. Identity and access control, ACL, privileged users. Change, configuration, vulnerability and patch management. Audit, security, standards, security assessment. (PV080, PV157)
  11. Security architecture. Network security, network isolation and segmentation, firewalls. Monitoring, detection and logging. Security of operating systems, data security. (PB156, PV004, PV175, PV280)
  12. Cybersecurity in the organization. Roles and activities of the organization's security team. Cybersecurity incident and its solution. Investigations (procedural rules) and forensics (technologies and procedures), DRP, BCM. Safety warning. Applicable security. (PV080, PV210, PV279)
Cyber security law and policy

  1. Definition of security studies. The concepts of security, threat and risk and their use in the field of cybersecurity. Internal and external security and sectors from the perspective of cybersecurity. Definition of security policy and its analysis with a focus on cybersecurity policy. (BSSb1101)
  2. Security strategy. Documents of the Czech Republic and the importance of cybersecurity in them. The security system of the Czech Republic and the role of institutions in the field of cybersecurity. (BSSb1103)
  3. Cyberval. Definitions and history. The concept of netwars and its use in cyber conflict. (BSSb1152)
  4. Critical infrastructure protection. Cyber attacks on critical infrastructure. Assignment and deterrence in cyberspace. (BSSb1103)
  5. Legal regulation of cybersecurity in the Czech Republic and the EU. Basic institutes, principles, obligatory bodies, system of ensuring cyber security. (BVV03K)
  6. Cybercrime. Sources of law (national, European and international), typical crime, classification of crimes, legal qualifications and related procedures and criteria, international cooperation. (BVV03K)
  7. Electronic evidence and their securing . Process institutes and their practical use, handling of electronic evidence, electronic documents. (BVV03K)
  8. Privacy and personality protection. Concepts, legislation, decision-making practice. (BI201K)
  9. Intellectual property law Copyright protection, use, technological means of work protection, protection of computer programs, software licenses, database rights. (BI201K)
  10. Responsibility of information society service providers. Legal regulation in the Czech Republic and in the EU, decision-making practice, provider of information society services, limitation of liability. (BI201K)