Security policy - proposal and application, assessment of risks, security auditing, penetration tests. Security functions in environment of operation systems, databases and networks.
Object security, personal policy, administrative measures.
The course gives an overview of methods of using security mechanisms, in every part of an information system, in all phases of its life cycle. Formal models of security, verification and validation techniques and applications of all separation types will be discussed.