Cybernality
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
MI-KYB | ZK | 4 | 2+0 | Czech |
- Lecturer:
- Michaela Stonová (gar.)
- Tutor:
- Michaela Stonová (gar.)
- Supervisor:
- Department of Computer Systems
- Synopsis:
-
Students get acquainted with the fundamentals of legislation and international activities in the area of fighting cybercrime. Students will understand the classification of attacks and have an overview of systems for computer surveillance and traffic monitoring in the cyberspace. Students will also familiarize themselves with hacker activities and behavior.
- Requirements:
- Syllabus of lectures:
-
1. Basic leslative norms relevant for operation of computer systems and networks, basic notions.
2. Classification of attacks.
3. Systems for computer network operation monitoring.
4. Cybernetic attacks, psychologic and social aspects of a cybernetic attack, life cycle of exploiting the system weaknesses.
5. Hackers - hacker comunity, types and motivations of the hacker behaviour.
6. Cyberterorism, its demonstration and methods.
7. Principles of infoware, the role of intelligent agents, strategic information warfare.
8. Principles of attacks on the web, trends of attacks and attackers, phases of an attack, coordination and management of an attack.
9. Basic types of attacks - DoS, forged node, manipulation with address sequences.
- Syllabus of tutorials:
- Study Objective:
-
The goal of this module is to provide knowledge of cyberspace attacks, systems for their monitoring and analysis, and an overview of a corresponding legislative. It also familiarizes students with principles of network attacks and means how to defend against them at the organization level.
- Study materials:
-
1. Stephenson, P. ''Investigating Computer-Related Crime''. CRC, 1999. ISBN 0849322189.
3. Klander, L., Renehan, E. J. ''Hacker Proof : The Ultimate Guide to Network Security''. Jamsa Press, 1997. ISBN 188413355X.
4. Harley, D., Slade, R. ''Viruses Revealed''. McGraw-Hill, 2001. ISBN 0072130903.
- Note:
- Further information:
- No time-table has been prepared for this course
- The course is a part of the following study plans:
-
- Branch Software Engineering, Version for Students who Enrolled in 2010, Presented in Czech (compulsory course in the program, PH)
- Master Branch Web Engineering - Version for Students who Enrolled in 2010, Presented in Czech (compulsory course in the program, PH)
- Computer Security, Version for Students who Enrolled in 2010, Presented in Czech (compulsory course in the program, PH)
- Design of Digital Systems, Version for Students who Enrolled in 2010, Presented in Czech (compulsory course in the program, PH)
- Computer Systems and Networks, Version for Students who Enrolled in 2010, Presented in Czech (compulsory course in the program, PH)
- Branch System Programming, Version for Students who Enrolled in 2010, Presented in Czech (compulsory course in the program, PH)
- Branch System Programming, Version for Students who Enrolled in 2010, Presented in Czech (compulsory course in the program, PH)
- Knowledge Engineering, Version for Students who Enrolled in 2010, Presented in Czech (compulsory course in the program, PH)
- Branch Web and Software Engineering, Version for Students who Enrolled in 2010, Presented in Czech (compulsory course in the program, PH)
- Master Informatics, Version for Students who Enrolled in 2010, Presented in Czech (compulsory course in the program, PH)