45 results

The article reports on the experience from the courses called ‘Analysis of information sources’ and ‘Designing communication and information systems (CIS) - Information management’ at the University of Defence in Brno. The courses are a part of the Master’s Study Programme. Their goal is to master work with Tovek Tools (TT) created by TOVEK [2] and established within the Ministry of Defence of the Czech Republic. Students gain knowledge from using the TT. They undergo orientation training and then they can manage the information resources workflow. The course has been designed to contribute to the development of creative abilities of individual students. There is also a course book [3] available for them. The courses are suitable for both face-to-face instruction and distance learning.


University staff. KMS team member.


The Cisco Networking Academy (CNA) has been established at the University of Defence fourteenth years ago. That project allows very effective teaching of basic and advanced issues of computer networks, network security, etc. - both theoretically and especially practically.


The paper describes two projectsof Deparment of Communication and Information Systems of University of Defencein Brno. The first one is the Crypto Mouse. It is a computer mouse emulating OpenPGP crypto card. It contains ARM micro-controller with Gnuk software installed. Unlike ordinary solution using card and crypto card reader this solutionis inconspicious. Signing, validating, encrypting and decrypting of data can be used by mouse. Gnuk is free software so anyone can download the code and verify it. The second project isthe Trojan USB Device. This Trojan USB Device can look like ordinary USB flash drive but in reality it can be for example a fake keyboard. When this Trojan USB Device is plugged into USB port it is activated and started to "write" prepared words or even run prepared commands. For example it starts the web browser and surf to the prepared web site, starts the Command Promt and run the command format C: to format hard drive or collects the private data and send them by email or transfer by ftp to the Trojan USB Device owner. Both pojects are used in computer security lessons at the Department of Communication and Infomation Systems.

 

Remove Filters

Domains

Timeline

Geography

Sources

cefme-lnk-arr.pngCefme changes cefme-lnk-arr.pngAbout us
cefme-lnk-arr.pngContributions welcome!
cefme-lnk-arr.pngFAQ cefme-lnk-arr.pngContacts cefme-lnk-arr.pngNATO & Research
                              
Powered by ATOM – web database ontology engine