Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2024/2025

Cybernality

The course is not on the list Without time-table
Code Completion Credits Range Language
NI-KYB ZK 5 2P Czech
Garant předmětu:
Lecturer:
Tutor:
Supervisor:
Department of Information Security
Synopsis:

Students get acquainted with the fundamentals of legislation and international activities in the area of fighting cybercrime. Students will understand the classification of attacks and have an overview of systems for computer surveillance and traffic monitoring in the cyberspace. Students will also familiarize themselves with hacker activities and behavior. The course will also discuss the cooperation of the state agencies and subjects dealing with defence of the cyberspace (especially CSIRT and CERT teams).

Requirements:

There are no input knowledge requirements.

Syllabus of lectures:

1. Introduction to Cybernality.

2. Legal norms regulating cyberspace.

3. ISP Regulations.

4. Contracts and Licences.

5. Copyright.

6. Botnets.

7. Cybernetic attacks (hacking, cracking, malware).

8. Cybernetic attacks (data theft, DoS, DDoS, cyberstalking, etc.).

9. Cybernetic attacks (financially motivated attacks - phishing pharming, mobile phishing).

10. Games and Social Networks.

11. Activities of LEA.

12. The Cyber Security Act.

13. CERT/CSIRT. Public Private Partnership. Summary.

Syllabus of tutorials:

There are not exercises.

Study Objective:

The goal of this module is to provide knowledge of cyberspace attacks, systems for their monitoring and analysis, and an overview of a corresponding legislative. It also familiarizes students with principles of network attacks and means how to defend against them at the organization level.

Study materials:

1. CASEY, E. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, Second Edition. London : Academic Press, 2004. 677 s. ISBN 0-12-163104-4.

2. ENISA. Botnets: Measurement, Detection, Disinfection and Defence. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/botnets/botnets-measurement-detection-disinfection-and-defence.

3. HARLEY, D., SLADE, R. ''Viruses Revealed''. McGraw-Hill, 2001. ISBN 0072130903.

4. KLANDER, L., RENEHAN, E. J. ''Hacker Proof : The Ultimate Guide to Network Security''. Jamsa Press, 1997. ISBN 188413355X.

Note:
Further information:
https://courses.fit.cvut.cz/MI-KYB/index.html
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2024-10-07
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/en/predmet6169106.html