Cybernality
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
NI-KYB | ZK | 5 | 2P | Czech |
- Garant předmětu:
- Lecturer:
- Tutor:
- Supervisor:
- Department of Information Security
- Synopsis:
-
Students get acquainted with the fundamentals of legislation and international activities in the area of fighting cybercrime. Students will understand the classification of attacks and have an overview of systems for computer surveillance and traffic monitoring in the cyberspace. Students will also familiarize themselves with hacker activities and behavior. The course will also discuss the cooperation of the state agencies and subjects dealing with defence of the cyberspace (especially CSIRT and CERT teams).
- Requirements:
-
There are no input knowledge requirements.
- Syllabus of lectures:
-
1. Introduction to Cybernality.
2. Legal norms regulating cyberspace.
3. ISP Regulations.
4. Contracts and Licences.
5. Copyright.
6. Botnets.
7. Cybernetic attacks (hacking, cracking, malware).
8. Cybernetic attacks (data theft, DoS, DDoS, cyberstalking, etc.).
9. Cybernetic attacks (financially motivated attacks - phishing pharming, mobile phishing).
10. Games and Social Networks.
11. Activities of LEA.
12. The Cyber Security Act.
13. CERT/CSIRT. Public Private Partnership. Summary.
- Syllabus of tutorials:
-
There are not exercises.
- Study Objective:
-
The goal of this module is to provide knowledge of cyberspace attacks, systems for their monitoring and analysis, and an overview of a corresponding legislative. It also familiarizes students with principles of network attacks and means how to defend against them at the organization level.
- Study materials:
-
1. CASEY, E. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, Second Edition. London : Academic Press, 2004. 677 s. ISBN 0-12-163104-4.
2. ENISA. Botnets: Measurement, Detection, Disinfection and Defence. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/botnets/botnets-measurement-detection-disinfection-and-defence.
3. HARLEY, D., SLADE, R. ''Viruses Revealed''. McGraw-Hill, 2001. ISBN 0072130903.
4. KLANDER, L., RENEHAN, E. J. ''Hacker Proof : The Ultimate Guide to Network Security''. Jamsa Press, 1997. ISBN 188413355X.
- Note:
- Further information:
- https://courses.fit.cvut.cz/MI-KYB/index.html
- No time-table has been prepared for this course
- The course is a part of the following study plans:
-
- Master specialization Computer Security, in Czech, 2020 (elective course)
- Master specialization Design and Programming of Embedded Systems, in Czech, 2020 (elective course)
- Master specialization Computer Systems and Networks, in Czech, 202 (elective course)
- Master specialization Management Informatics, in Czech, 2020 (elective course)
- Master specialization Software Engineering, in Czech, 2020 (elective course)
- Master specialization System Programming, in Czech, version from 2020 (elective course)
- Master specialization Web Engineering, in Czech, 2020 (elective course)
- Master specialization Knowledge Engineering, in Czech, 2020 (elective course)
- Master specialization Computer Science, in Czech, 2020 (elective course)
- Mgr. programme, for the phase of study without specialisation, ver. for 2020 and higher (elective course)
- Study plan for Ukrainian refugees (elective course)
- Master specialization System Programming, in Czech, version from 2023 (elective course)
- Master specialization Computer Science, in Czech, 2023 (elective course)