translated by Google

Machine-translated page for increased accessibility for English questioners.

CSC questions

Single-subject study plan

Technology and security

  1. Computer systems. Numerical systems, relations between systems, computer display of an integer, arithmetic. Codes, internal, external, detection and correction. Processors, their parameters and architectures. Internal and external memories and principles of their function. Computer input and output devices and their connection. ( PB150 )
  2. Operating system. Operating system architecture, kernel architecture, basic processor modes. Programming interfaces, libraries. User, access rights, virtualization. Virtual memory, process and page tables. Thread, thread and process planning. Concurrency, deadlocks, resource allocation. Process creation and program execution in POSIX systems, copy-on-write. ( PB152 , PV004 )
  3. File systems. Block device, block layer, I / O scheduler, RAID, disk encryption. Ordinary files, free space allocation, fragmentation. Directory structure and its representation on disk. Memory mapped input and output. ( PB152 , PV004 )
  4. Networks. Computer network layer models (ISO / OSI, TCP / IP). functionality and interoperability of layers, addressing. Physical layer, signals and their coding, media access control. Interconnection of computer networks. Network protocols, switching and routing, multicast. Secured data transfer, connection setup and termination. Transport protocols. ( PB156 )
  5. Network applications and security. Basic application protocols: mail delivery, file transfer, web, name service. Principles of description and quality assurance of services, use for multimedia. Network communication security, authentication and encryption, security at individual protocol layers. ( PB156 )
  6. Principles of programming. Structured programming in imperative language. Program memory model; memory management, dynamic allocation, work with user data structures. Low-level work with memory, pointer, array and indicator arithmetic. Methods of debugging the program. Secure programming and SW development. ( PB071 , PV080 )
  7. Database. Relational model, relational schema, relational schema keys, integrity constraints, relational algebra, relation joining. SQL query language (select statement, relation joins, aggregation functions). Query processing. Basic principles, example. Indexing. Transaction. Transaction processing properties. ( PB168 )
  8. Software and information systems Development and operation of software systems. Use of UML in software development. Applied information systems. Large information systems architectures. Methods of managing large projects. IS operation management. ( PB007 , PV028 )
  9. Basic security functions and their provision - confidentiality, integrity, availability, non-repudiation of origin. Security organization and management, security policies and procedures. Cybersecurity management structure, roles, responsibilities and competencies. Security Maturity Model. ( PV080 )
  10. Risk analysis and management. Asset management, risk analysis, risk management and their effectiveness. Identity and access control, ACLs, privileged users. Change, configuration, vulnerability and patch management. Audit, security, standards, security assessment. ( PV080 , PV157 )
  11. Security architecture. Network security, network isolation and segmentation, firewalls. Monitoring, detection and logging. Security of operating systems, data security. ( PB156 , PV004 , PV175 , PV280 )
  12. Cybersecurity in the organization. Roles and activities of the organization's security team. Cybersecurity incident and its solution. Investigations (procedural rules) and forensics (technologies and procedures), DRP, BCM. Safety warnings. Applicable security. ( PV080 , PV210 , PV279 )
Cybersecurity Law and Policy

  1. Definition of security studies. The concepts of security, threat and risk and their use in the field of cybersecurity. Internal and external security and cybersecurity sectors. Definition of security policy and its analysis with a focus on cybersecurity policy. ( BSSb1101 )
  2. Security strategy. Documents of the Czech Republic and the importance of cybersecurity in them. The security system of the Czech Republic and the role of institutions in the field of cybersecurity. ( BSSb1103 )
  3. Cyberval. Definitions and history. The concept of netwars and its use in cyber conflict. ( BSSb1152 )
  4. Critical infrastructure protection. Cyber attacks on critical infrastructure. Assignment and deterrence in cyberspace. ( BSSb1103 )
  5. Cyber security legislation in the Czech Republic and the EU. Basic institutes, principles, obligatory bodies, system of ensuring cyber security. ( BVV03K )
  6. Cybercrime. Sources of law (national, European and international), typical crime, classification of crimes, legal qualifications and related procedures and criteria, international cooperation. ( BVV03K )
  7. Electronic evidence and their securing . Process institutes and their practical use, handling of electronic evidence, electronic documents. ( BVV03K )
  8. Privacy and personality protection. Concepts, legislation, decision-making practice. ( BI201K )
  9. Intellectual property law Protection of copyright, use, technological means of protection of work, protection of computer programs, software licenses, database rights. ( BI201K )
  10. Liability of information society service providers. Legal regulation in the Czech Republic and in the EU, decision-making practice, information society service provider, limitation of liability. ( BI201K )