Translated using DeepL

Machine-translated page for increased accessibility for English questioners.

B-CS Cybersecurity questions

Single-subject curriculum

Technology and Security

  1. Computer Systems. Number systems, relationships between systems, whole number representation in the computer, arithmetic. Codes, internal, external, detection and correction. Processors, their parameters and architectures. Internal and external memories and principles of their function. Computer input and output devices and their connection. (PB150)
  2. Operating systems. Operating system architecture, kernel architecture, basic processor modes. Programming interfaces, libraries. User, access rights, virtualization. Virtual memory, process and page tables. Threads, thread and process scheduling. Concurrency, deadlock, resource allocation. Process creation and program execution in POSIX systems, copy-on-write. (PB152, PV004)
  3. File systems. Block device, block layer, I/O scheduler, RAID, disk encryption. Ordinary files, free space allocation, fragmentation. Directory structure and its representation on disk. Memory mapped input and output. (PB152, PV004)
  4. Networks. Layer models of computer networks (ISO/OSI, TCP/IP). Physical layer, signals and their encoding, media access control. Interconnection of computer networks. Network protocols, switching and routing, multicast. Secured data transmission, connection setup and termination. Transport protocols. (PB156)
  5. Network applications and security. Basic application protocols: mail delivery, file transfer, web, name service. Principles of service description and quality assurance, application to multimedia. Network communication security, authentication and encryption, security at the protocol layer. (PB156)
  6. Principles of programming. Structured programming in imperative language. Program memory model; memory management, dynamic allocation, working with user data structures. Low-level memory handling, pointer, array and pointer arithmetic. Methods of program debugging. Safe programming and software development (PB071, PV080).
  7. Databases. Relational model, relational schema, keys of relational schemas, integrity constraints, relational algebra, linking relations. SQL query language (select statement, session joins, aggregation functions). Query processing. Basic principles, example. Indexing. Transactions. Features of transaction processing. (PB168)
  8. Software and information systems Development and operation of software systems. Use of UML in software development. Applied information systems. Architectures of large-scale information systems. Methods of managing large-scale projects. IS operations management. (PB007, PV028)
  9. Basic security functions and their assurance - confidentiality, integrity, availability, undeniability of origin. Organisation and management of security, security policies and procedures. Cybersecurity management structure, roles, responsibilities and competencies. Security Maturity Model. (PV080)
  10. Risk analysis and management. Asset management, risk analysis, risk measures and their effectiveness. Identity and access management, ACLs, privileged users. Change, configuration, vulnerability and patch management. Audit, security, standards, security assessment. (PV080, PV157)
  11. Security Architecture (state semester Fall 2023 and Spring 2024). Network security, network isolation and segmentation, firewalls. Monitoring, detection, and logging. Operating systems security, data security. (PB156, PV004, PV280)
  12. Security Architecture (statewide starting Fall 2024 semester). Network security, network isolation and segmentation, firewalls. Monitoring, detection, and logging. Operating systems security, data security. (PB156, PV004, PV175, PV280)
  13. Cybersecurity in the organization. Roles and activities of an organization's security team. Cybersecurity incident and its resolution. Investigation (procedural rules) and forensics (technology and procedures), DRP, BCM. Security alerting. Applicable security. (PV080, PV210, PV279)
Cybersecurity law and policy.

  1. Definition of security studies. The terms security, threat and risk and their application to cybersecurity. Internal and external security and sectors from a cybersecurity perspective. Security policy definition and analysis with a focus on cybersecurity policy. (BSSb1101)
  2. Security Strategy. Documents of the Czech Republic and the importance of cybersecurity in them. Security system of the Czech Republic and the role of institutions in the field of cybersecurity. (BSSb1103)
  3. Cyberwarfare. Definition and history. The concept of netwars and its use in cyber conflict. (BSSb1152)
  4. Critical Infrastructure Protection. Cyber attacks on critical infrastructure. Attribution and deterrence in cyberspace. (BSSb1103)
  5. Legal regulation of cyber security in the Czech Republic and the EU. Basic institutes, principles, obligatory bodies, system of cyber security assurance. (BVV03K)
  6. Cybercrime. Sources of law (national, European and international), typical criminal activities, classification of crimes, legal qualification and related procedures and criteria, international cooperation.
  7. Electronic evidence and its securing. Procedural institutes and their practical use, handling of electronic evidence, electronic documents. (BVV03K)
  8. Privacy and protection of personality. Concepts, legal regulation, decision-making practice. (BI201K)
  9. Intellectual property law Protection of copyright works, use, technological means of protection of works, protection of computer programs, software licenses, database rights. (BI201K)
  10. Liability of information society service providers. Legal regulation in the Czech Republic and in the EU, decision-making practice, information society service provider, limitation of liability. (BI201K)