Skip to main content
Skip header

Cyber Crime

Summary

The main aim of this course is to obtain detailed knowledge about crimes committed by using information and communication technologies. Student will be also able to identify and describe crime committed by ITC. The course also describes the procedure of law enforcement bodies within a cyber crime investigation not only in the Czech republic but also in the context of international treaties. Separate attention is devoted to security teams which are working on prevention and detection of cyber attacks.

Literature

CASEY, E. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Second Edition. London : Academic Press, 2004. 677 s. ISBN 0-12-163104-4 .

ENISA. Botnets: Measerement, Detection, Disinfection and Defence. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/botnets/botnets-measurement-detection-disinfection-and-defence.

HARLEY, D., SLADE, R. Viruses Revealed. McGraw-Hill, 2001. ISBN 0072130903 .

KLANDER, L., RENEHAN, E. J. Hacker Proof : The Ultimate Guide to Network Security. Jamsa Press, 1997. ISBN 188413355X .

Advised literature

KOLOUCH, Jan a Andrea KROPÁČOVÁ. Procedural Aspects of Data Seizure. In: Latest Trends on Systems Volume I : Proceedings of the 18th International Conference on Systems (part of CSCC ’14). [B.m.], c2014, s. 385 - 388. Recent Advances in Electrical Engineering Series, 37. ISBN 978-1-61804-243-9 ISSN 1790-5117 .

KOLOUCH, Jan a Andrea KROPÁČOVÁ. Liability for Own Device and Data and Applications Stored therein. In: Advances in Information Science and Applications Volume I : Proceedings of the 18th International Conference on Computers (part of CSCC ’14). [B.m.], c2014, s. 321 - 324. Recent Advances in Computer Engineering Series, 22. ISBN 978-1-61804-236-1  ISSN 1790-5109 .

KOLOUCH, Jan. Criminal liability for DoS and DDoS attacks. In: Recent advances in computer science : proceedings of the 17th International Conference on Computers (part of CSCC '13) : proceedings of the 1st International Conference on Artificial Intelligence and Cognitive Science (AICS '13) : proceedings of the 1st International Conference on Innovative Computing and Information Processing (INCIP '13): Rhodes Island, Greece. [Athen]: WSEAS Press, 2013, s. 227-231. ISBN 978-960-474-311-7 .


Language of instruction čeština, angličtina
Code 440-8402
Abbreviation KYK
Course title Cyber Crime
Coordinating department Department of Telecommunications
Course coordinator doc. JUDr. Jan Kolouch, Ph.D.