Skip to main content
Skip header

Cyber Crime

* Exchange students do not have to consider this information when selecting suitable courses for an exchange stay.

Course Unit Code440-8402/01
Number of ECTS Credits Allocated4 ECTS credits
Type of Course Unit *Compulsory
Level of Course Unit *Second Cycle
Year of Study *Second Year
Semester when the Course Unit is deliveredWinter Semester
Mode of DeliveryFace-to-face
Language of InstructionCzech
Prerequisites and Co-Requisites Course succeeds to compulsory courses of previous semester
Name of Lecturer(s)Personal IDName
KOL0335doc. JUDr. Jan Kolouch, Ph.D.
ZAH0076Ing. Tomáš Zahradnický, Ph.D.
Summary
The main aim of this course is to obtain detailed knowledge about crimes committed by using information and communication technologies. Student will be also able to identify and describe crime committed by ITC. The course also describes the procedure of law enforcement bodies within a cyber crime investigation not only in the Czech republic but also in the context of international treaties. Separate attention is devoted to security teams which are working on prevention and detection of cyber attacks.
Learning Outcomes of the Course Unit
The course is divided into several blocks which are thematically focused on the following areas: definition of basic terminology (Cyber delict, the notion of Cybercrime, computer, computer system, computer network and its types, copyrighted work, Internet, communication protocol etc.), sources of international law in the field of protection against the cybercrime, impact in the legal system of Czech Republic (European Union law, International law, UN signed documents, etc.), legal forms demarcations, typical cybercrime techniques (software piracy, phishing, pharming, distribution of malicious content, denial of service, etc.), substantive law aspects (crime analysis, illegal methods of ICT abuse analysis), procedural law aspects (specifics of local jurisdiction, participants in crime investigation and jurisdiction, obtaining evidence and information about cybercrimes for investigation).
Course Contents
1.Introduction
2.Cyberspace regulation by legal norms
3.ISP (Internet Service Provider) service law basis
4.Privacy and safety in IT, data protection on the Internet
5.Copyrights
6.Botnet
7.Cybercrime methods I: Malware, Hacking
8.Cybercrime methods II: Phishing, Pharming, Spam
9.Cybercrime methods III: Ransomware, cyber squatting
10.Cybercrime methods IV: Child abuse on the internet and their protection
11.Games and social networks
12.Law enforcement activities in cyberspace
13.Cyber security law
14.CERT/CSIRT
Recommended or Required Reading
Required Reading:
CASEY, E. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Second Edition. London : Academic Press, 2004. 677 s. ISBN 0-12-163104-4.

ENISA. Botnets: Measerement, Detection, Disinfection and Defence. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/botnets/botnets-measurement-detection-disinfection-and-defence.

HARLEY, D., SLADE, R. Viruses Revealed. McGraw-Hill, 2001. ISBN 0072130903.

KLANDER, L., RENEHAN, E. J. Hacker Proof : The Ultimate Guide to Network Security. Jamsa Press, 1997. ISBN 188413355X.
KOLOUCH, Jan. CybreCrime, Edice CZ.NIC: 1. vydání, 2016, ISBN 978-80-88168-18-8 URL https://knihy.nic.cz/files/edice/cybercrime.pdf

KOLOUCH, Jan a Petr VOLEVECKÝ. Trestněprávní ochrana před kybernetickou kriminalitou. Praha: Policejní akademie České republiky v Praze, 2013. ISBN 978-80-7251-402-1

CASEY, E. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Second Edition. London : Academic Press, 2004. 677 s. ISBN 0-12-163104-4.

ENISA. Botnets: Measerement, Detection, Disinfection and Defence. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/botnets/botnets-measurement-detection-disinfection-and-defence.

GŘIVNA, T., POLČÁK, R. (eds.) Kyberkriminalita a právo. Praha: Auditorium s.r.o., 2008, 220 s. ISBN 978-80-903786-7-4.

HARLEY, D., SLADE, R. Viruses Revealed. McGraw-Hill, 2001. ISBN 0072130903.

JIROVSKÝ, V. Kybernetická kriminalita. Nejen o hackingu, crackingu, virech a trojských koních bez tajemství. 1. vyd. Praha: Grada Publishing, a.s., 2007. 288. ISBN 978-80-247-1561-2.

KLANDER, L., RENEHAN, E. J. Hacker Proof : The Ultimate Guide to Network Security. Jamsa Press, 1997. ISBN 188413355X.
Recommended Reading:
KOLOUCH, Jan a Andrea KROPÁČOVÁ. Procedural Aspects of Data Seizure. In: Latest Trends on Systems Volume I : Proceedings of the 18th International Conference on Systems (part of CSCC ’14). [B.m.], c2014, s. 385 - 388. Recent Advances in Electrical Engineering Series, 37. ISBN 978-1-61804-243-9 ISSN 1790-5117.

KOLOUCH, Jan a Andrea KROPÁČOVÁ. Liability for Own Device and Data and Applications Stored therein. In: Advances in Information Science and Applications Volume I : Proceedings of the 18th International Conference on Computers (part of CSCC ’14). [B.m.], c2014, s. 321 - 324. Recent Advances in Computer Engineering Series, 22. ISBN 978-1-61804-236-1 ISSN 1790-5109.

KOLOUCH, Jan. Criminal liability for DoS and DDoS attacks. In: Recent advances in computer science : proceedings of the 17th International Conference on Computers (part of CSCC '13) : proceedings of the 1st International Conference on Artificial Intelligence and Cognitive Science (AICS '13) : proceedings of the 1st International Conference on Innovative Computing and Information Processing (INCIP '13): Rhodes Island, Greece. [Athen]: WSEAS Press, 2013, s. 227-231. ISBN 978-960-474-311-7.
FENYK, Jaroslav, Ladislav SMEJKAL. Zákon o trestní odpovědnosti právnických osob a řízení proti nim. Komentář. Praha: Wolters Kluwer, 2012. s. 184. ISBN 978-80-7357-720-9.

KOLOUCH, Jan a Andrea KROPÁČOVÁ. Procedural Aspects of Data Seizure. In: Latest Trends on Systems Volume I : Proceedings of the 18th International Conference on Systems (part of CSCC ’14). [B.m.], c2014, s. 385 - 388. Recent Advances in Electrical Engineering Series, 37. ISBN 978-1-61804-243-9 ISSN 1790-5117.

KOLOUCH, Jan a Andrea KROPÁČOVÁ. Liability for Own Device and Data and Applications Stored therein. In: Advances in Information Science and Applications Volume I : Proceedings of the 18th International Conference on Computers (part of CSCC ’14). [B.m.], c2014, s. 321 - 324. Recent Advances in Computer Engineering Series, 22. ISBN 978-1-61804-236-1 ISSN 1790-5109.

KOLOUCH, Jan. Procesněprávní aspekty zajištění dat. In: Záhora, J. (ed.): Aktuálné problémy prípravného konania trestného. Praha: Leges, 2014, s. 228 - 241 ISBN 978-80-7502-030-7

KOLOUCH, Jan. Criminal liability for DoS and DDoS attacks. In: Recent advances in computer science : proceedings of the 17th International Conference on Computers (part of CSCC '13) : proceedings of the 1st International Conference on Artificial Intelligence and Cognitive Science (AICS '13) : proceedings of the 1st International Conference on Innovative Computing and Information Processing (INCIP '13): Rhodes Island, Greece. [Athen]: WSEAS Press, 2013, s. 227-231. ISBN 978-960-474-311-7.
Planned learning activities and teaching methods
Lectures, Tutorials
Assesment methods and criteria
Task TitleTask TypeMaximum Number of Points
(Act. for Subtasks)
Minimum Number of Points for Task Passing
Credit and ExaminationCredit and Examination100 (100)51
        CreditCredit30 (30)15
                EssayOther task type15 0
                ProjectSemestral project15 0
        ExaminationExamination70 (70)21
                Written examWritten examination40 0
                Oral examOral examination30 0