Cyber Security of Military Electronic Systems
KBVES-4-PK
Subject | Cyber Security of Military Electronic Systems (CSMES) |
Guarantee |
plk. gšt. doc. Ing. Petr Františ, Ph.D. |
Department | Katedra letecké techniky |
Specialization | NO |
Profiling subject | YES |
Theory profiling subject | NO |
Final exam | NO |
Multi semestral subject | NO |
Subject is guaranted by other school | NO |
Optionality | Povinný |
Clasification | Zkouška |
Credits | 10 |
Recommended year/semester | 1/2 |
Number of weeks | 14 |
Celkem (h) | Př. | Cv. | Lab. | Sem. | Kurzy | Praxe | Stáže | Soustř. | Exkurze | Terén | SP | Konzultace | PV | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
6 | 6 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
5 | 5 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
5 | 5 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
6 | 6 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Povinná:
<p>SHOSTACK, A. Threat modeling: designing for security. Indianapolis, IN: Wiley, 2014. ISBN 1118809998.</p>
<p>HROMADA, M., HRŮZA, P., KADERKA, J., LUŇÁČEK, O., NEČAS, M., PTÁČEK, B., SKORUŠA, L., SLOŽIL, R. Kybernetická bezpečnost: teorie a praxe. Praha: Powerprint s.r.o., 2015. ISBN 978-80-87994-72-6.</p>
<p>MONTROSE, M. I. NAKAUCHI, E. M. Testing for EMC compliance: approaches and techniques. Hoboken, NJ: John Wiley, 2004. ISBN 047143308X.</p>
<p>Lee, M. Cyber Threat Intelligence. Wiley, Apr. 2023. ISBN 9781119861744.</p>
<p>Havlík, M. Příčiny vzniku a začlenění kybernetických sil a informačních operací do Armády České republiky. Vojenské rozhledy. 2020, 29 (3), 072-086. ISSN 1210-3292 (print), 2336-2995 (on-line).</p>
<p>U.S. AIR Force. Air Force Doctrine Publication 3-12, Cyberspace Operations. Feb, 2023.</p>
<p>Knerler, K., Parker, I., Zimmerman, C. 11 Strategies of a World-Class Cybersecurity Operations Center, 2nd ed. Edition. Mitre, 2022. ISBN 979-8985645040</p>
<p>Zákon č. 181/2014 Sb. Zákon o kybernetické bezpečnosti a o změně souvisejících zákonů (zákon o kybernetické bezpečnosti)</p>
<p>KOLOUCH, Jan. CyberCrime, 1. vydání, Praha, nakladatelství CZ.NIC, 2017, 522 s., ISBN: 978-80-88168-15-7</p>
<p>U.S. AIR Force. Air Force Doctrine Publication 3-12, Cyberspace Operations. Feb, 2023</p>
<p>Cunningham, Ch. Cyber Warfare – Truth, Tactics, and Strategies. Packt, Feb, 2020. ISBN 9781839216992.</p>
<p>Lee, M. Cyber Threat Intelligence. Wiley, Apr. 2023. ISBN 9781119861744.</p>
Doporučená:
<p>RANDALL, K. NICHOLS, DTM., RYAN, J. J. C. H., MUMM, H. C., LONSTEIN, W. D., CARTER, C., THEOCHARIS, A. T. Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA's Advanced Air Assets, Independently published, 2018, ISBN 978-1724077066.</p>
<p>SHOSTACK, A. Threat modeling: designing for security. Indianapolis, IN: Wiley, 2014. ISBN 1118809998.</p>
<p>HROMADA, M., HRŮZA, P., KADERKA, J., LUŇÁČEK, O., NEČAS, M., PTÁČEK, B., SKORUŠA, L., SLOŽIL, R. Kybernetická bezpečnost: teorie a praxe. Praha: Powerprint s.r.o., 2015. ISBN 978-80-87994-72-6.</p>
<p>MONTROSE, M. I. NAKAUCHI, E. M. Testing for EMC compliance: approaches and techniques. Hoboken, NJ: John Wiley, 2004. ISBN 047143308X.</p>
<p>Lee, M. Cyber Threat Intelligence. Wiley, Apr. 2023. ISBN 9781119861744.</p>
<p>Havlík, M. Příčiny vzniku a začlenění kybernetických sil a informačních operací do Armády České republiky. Vojenské rozhledy. 2020, 29 (3), 072-086. ISSN 1210-3292 (print), 2336-2995 (on-line).</p>
<p>U.S. AIR Force. Air Force Doctrine Publication 3-12, Cyberspace Operations. Feb, 2023.</p>
<p>Knerler, K., Parker, I., Zimmerman, C. 11 Strategies of a World-Class Cybersecurity Operations Center, 2nd ed. Edition. Mitre, 2022. ISBN 979-8985645040</p>
<p>Zákon č. 181/2014 Sb. Zákon o kybernetické bezpečnosti a o změně souvisejících zákonů (zákon o kybernetické bezpečnosti)</p>
<p>KOLOUCH, Jan. CyberCrime, 1. vydání, Praha, nakladatelství CZ.NIC, 2017, 522 s., ISBN: 978-80-88168-15-7</p>
<p>U.S. AIR Force. Air Force Doctrine Publication 3-12, Cyberspace Operations. Feb, 2023</p>
<p>Cunningham, Ch. Cyber Warfare – Truth, Tactics, and Strategies. Packt, Feb, 2020. ISBN 9781839216992.</p>
<p>Lee, M. Cyber Threat Intelligence. Wiley, Apr. 2023. ISBN 9781119861744.</p>
Doporučená:
<p>RANDALL, K. NICHOLS, DTM., RYAN, J. J. C. H., MUMM, H. C., LONSTEIN, W. D., CARTER, C., THEOCHARIS, A. T. Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA's Advanced Air Assets, Independently published, 2018, ISBN 978-1724077066.</p>
Vypracování seminární práce + obhajoba
Ústní zkouška
8 hodin