Cybernality
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
MI-KYB.16 | ZK | 5 | 2P | Czech |
- Course guarantor:
- Lecturer:
- Tutor:
- Supervisor:
- Department of Information Security
- Synopsis:
-
Students get acquainted with the fundamentals of legislation and international activities in the area of fighting cybercrime. Students will understand the classification of attacks and have an overview of systems for computer surveillance and traffic monitoring in the cyberspace. Students will also familiarize themselves with hacker activities and behavior. The course will also discuss the cooperation of the state agencies and subjects dealing with defence of the cyberspace (especially CSIRT and CERT teams).
- Requirements:
- Syllabus of lectures:
-
1. Introduction to Cybernality.
2. Legal norms regulating cyberspace.
3. ISP Regulations.
4. Contracts and Licences.
5. Copyright.
6. Botnets.
7. Cybernetic attacks (hacking, cracking, malware).
8. Cybernetic attacks (data theft, DoS, DDoS, cyberstalking, etc.).
9. Cybernetic attacks (financially motivated attacks - phishing pharming, mobile phishing).
10. Games and Social Networks.
11. Activities of LEA.
12. The Cyber Security Act.
13. CERT/CSIRT. Public Private Partnership. Summary.
- Syllabus of tutorials:
- Study Objective:
-
The goal of this module is to provide knowledge of cyberspace attacks, systems for their monitoring and analysis, and an overview of a corresponding legislative. It also familiarizes students with principles of network attacks and means how to defend against them at the organization level.
- Study materials:
-
1. CASEY, E. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, Second Edition. London : Academic Press, 2004. 677 s. ISBN 0-12-163104-4.
2. ENISA. Botnets: Measurement, Detection, Disinfection and Defence. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/botnets/botnets-measurement-detection-disinfection-and-defence.
3. HARLEY, D., SLADE, R. ''Viruses Revealed''. McGraw-Hill, 2001. ISBN 0072130903.
4. KLANDER, L., RENEHAN, E. J. ''Hacker Proof : The Ultimate Guide to Network Security''. Jamsa Press, 1997. ISBN 188413355X.
- Note:
- Further information:
- https://courses.fit.cvut.cz/MI-KYB/index.html
- No time-table has been prepared for this course
- The course is a part of the following study plans:
-
- Master branch Knowledge Engineering, in Czech, 2016-2017 (compulsory elective humanities course)
- Master branch Computer Security, in Czech, 2016-2019 (compulsory elective humanities course)
- Master branch Computer Systems and Networks, in Czech, 2016-2019 (compulsory elective humanities course)
- Master branch Design and Programming of Embedded Systems, in Czech, 2016-2019 (compulsory elective humanities course)
- Master branch Web and Software Engineering, spec. Info. Systems and Management, in Czech, 2016-2019 (compulsory elective humanities course)
- Master branch Web and Software Engineering, spec. Software Engineering, in Czech, 2016-2019 (compulsory elective humanities course)
- Master branch Web and Software Engineering, spec. Web Engineering, in Czech, 2016-2019 (compulsory elective humanities course)
- Master program Informatics, unspecified branch, in Czech, version 2016-2019 (compulsory elective humanities course)
- Master branch System Programming, spec. System Programming, in Czech, 2016-2019 (compulsory elective humanities course)
- Master branch System Programming, spec. Computer Science, in Czech, 2016-2017 (compulsory elective humanities course)
- Master specialization Computer Science, in Czech, 2018-2019 (elective course)
- Master branch Knowledge Engineering, in Czech, 2018-2019 (compulsory elective humanities course)