Course Unit Code | 440-8402/01 |
---|
Number of ECTS Credits Allocated | 4 ECTS credits |
---|
Type of Course Unit * | Compulsory |
---|
Level of Course Unit * | Second Cycle |
---|
Year of Study * | Second Year |
---|
Semester when the Course Unit is delivered | Winter Semester |
---|
Mode of Delivery | Face-to-face |
---|
Language of Instruction | Czech |
---|
Prerequisites and Co-Requisites | Course succeeds to compulsory courses of previous semester |
---|
Name of Lecturer(s) | Personal ID | Name |
---|
| KOL0335 | doc. JUDr. Jan Kolouch, Ph.D. |
| ZAH0076 | Ing. Tomáš Zahradnický, Ph.D. |
Summary |
---|
The main aim of this course is to obtain detailed knowledge about crimes committed by using information and communication technologies. Student will be also able to identify and describe crime committed by ITC. The course also describes the procedure of law enforcement bodies within a cyber crime investigation not only in the Czech republic but also in the context of international treaties. Separate attention is devoted to security teams which are working on prevention and detection of cyber attacks. |
Learning Outcomes of the Course Unit |
---|
The course is divided into several blocks which are thematically focused on the following areas: definition of basic terminology (Cyber delict, the notion of Cybercrime, computer, computer system, computer network and its types, copyrighted work, Internet, communication protocol etc.), sources of international law in the field of protection against the cybercrime, impact in the legal system of Czech Republic (European Union law, International law, UN signed documents, etc.), legal forms demarcations, typical cybercrime techniques (software piracy, phishing, pharming, distribution of malicious content, denial of service, etc.), substantive law aspects (crime analysis, illegal methods of ICT abuse analysis), procedural law aspects (specifics of local jurisdiction, participants in crime investigation and jurisdiction, obtaining evidence and information about cybercrimes for investigation). |
Course Contents |
---|
1.Introduction
2.Cyberspace regulation by legal norms
3.ISP (Internet Service Provider) service law basis
4.Privacy and safety in IT, data protection on the Internet
5.Copyrights
6.Botnet
7.Cybercrime methods I: Malware, Hacking
8.Cybercrime methods II: Phishing, Pharming, Spam
9.Cybercrime methods III: Ransomware, cyber squatting
10.Cybercrime methods IV: Child abuse on the internet and their protection
11.Games and social networks
12.Law enforcement activities in cyberspace
13.Cyber security law
14.CERT/CSIRT
|
Recommended or Required Reading |
---|
Required Reading: |
---|
CASEY, E. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Second Edition. London : Academic Press, 2004. 677 s. ISBN 0-12-163104-4.
ENISA. Botnets: Measerement, Detection, Disinfection and Defence. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/botnets/botnets-measurement-detection-disinfection-and-defence.
HARLEY, D., SLADE, R. Viruses Revealed. McGraw-Hill, 2001. ISBN 0072130903.
KLANDER, L., RENEHAN, E. J. Hacker Proof : The Ultimate Guide to Network Security. Jamsa Press, 1997. ISBN 188413355X.
|
KOLOUCH, Jan. CybreCrime, Edice CZ.NIC: 1. vydání, 2016, ISBN 978-80-88168-18-8 URL https://knihy.nic.cz/files/edice/cybercrime.pdf
KOLOUCH, Jan a Petr VOLEVECKÝ. Trestněprávní ochrana před kybernetickou kriminalitou. Praha: Policejní akademie České republiky v Praze, 2013. ISBN 978-80-7251-402-1
CASEY, E. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Second Edition. London : Academic Press, 2004. 677 s. ISBN 0-12-163104-4.
ENISA. Botnets: Measerement, Detection, Disinfection and Defence. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/botnets/botnets-measurement-detection-disinfection-and-defence.
GŘIVNA, T., POLČÁK, R. (eds.) Kyberkriminalita a právo. Praha: Auditorium s.r.o., 2008, 220 s. ISBN 978-80-903786-7-4.
HARLEY, D., SLADE, R. Viruses Revealed. McGraw-Hill, 2001. ISBN 0072130903.
JIROVSKÝ, V. Kybernetická kriminalita. Nejen o hackingu, crackingu, virech a trojských koních bez tajemství. 1. vyd. Praha: Grada Publishing, a.s., 2007. 288. ISBN 978-80-247-1561-2.
KLANDER, L., RENEHAN, E. J. Hacker Proof : The Ultimate Guide to Network Security. Jamsa Press, 1997. ISBN 188413355X.
|
Recommended Reading: |
---|
KOLOUCH, Jan a Andrea KROPÁČOVÁ. Procedural Aspects of Data Seizure. In: Latest Trends on Systems Volume I : Proceedings of the 18th International Conference on Systems (part of CSCC ’14). [B.m.], c2014, s. 385 - 388. Recent Advances in Electrical Engineering Series, 37. ISBN 978-1-61804-243-9 ISSN 1790-5117.
KOLOUCH, Jan a Andrea KROPÁČOVÁ. Liability for Own Device and Data and Applications Stored therein. In: Advances in Information Science and Applications Volume I : Proceedings of the 18th International Conference on Computers (part of CSCC ’14). [B.m.], c2014, s. 321 - 324. Recent Advances in Computer Engineering Series, 22. ISBN 978-1-61804-236-1 ISSN 1790-5109.
KOLOUCH, Jan. Criminal liability for DoS and DDoS attacks. In: Recent advances in computer science : proceedings of the 17th International Conference on Computers (part of CSCC '13) : proceedings of the 1st International Conference on Artificial Intelligence and Cognitive Science (AICS '13) : proceedings of the 1st International Conference on Innovative Computing and Information Processing (INCIP '13): Rhodes Island, Greece. [Athen]: WSEAS Press, 2013, s. 227-231. ISBN 978-960-474-311-7.
|
FENYK, Jaroslav, Ladislav SMEJKAL. Zákon o trestní odpovědnosti právnických osob a řízení proti nim. Komentář. Praha: Wolters Kluwer, 2012. s. 184. ISBN 978-80-7357-720-9.
KOLOUCH, Jan a Andrea KROPÁČOVÁ. Procedural Aspects of Data Seizure. In: Latest Trends on Systems Volume I : Proceedings of the 18th International Conference on Systems (part of CSCC ’14). [B.m.], c2014, s. 385 - 388. Recent Advances in Electrical Engineering Series, 37. ISBN 978-1-61804-243-9 ISSN 1790-5117.
KOLOUCH, Jan a Andrea KROPÁČOVÁ. Liability for Own Device and Data and Applications Stored therein. In: Advances in Information Science and Applications Volume I : Proceedings of the 18th International Conference on Computers (part of CSCC ’14). [B.m.], c2014, s. 321 - 324. Recent Advances in Computer Engineering Series, 22. ISBN 978-1-61804-236-1 ISSN 1790-5109.
KOLOUCH, Jan. Procesněprávní aspekty zajištění dat. In: Záhora, J. (ed.): Aktuálné problémy prípravného konania trestného. Praha: Leges, 2014, s. 228 - 241 ISBN 978-80-7502-030-7
KOLOUCH, Jan. Criminal liability for DoS and DDoS attacks. In: Recent advances in computer science : proceedings of the 17th International Conference on Computers (part of CSCC '13) : proceedings of the 1st International Conference on Artificial Intelligence and Cognitive Science (AICS '13) : proceedings of the 1st International Conference on Innovative Computing and Information Processing (INCIP '13): Rhodes Island, Greece. [Athen]: WSEAS Press, 2013, s. 227-231. ISBN 978-960-474-311-7.
|
Planned learning activities and teaching methods |
---|
Lectures, Tutorials |
Assesment methods and criteria |
---|
Task Title | Task Type | Maximum Number of Points (Act. for Subtasks) | Minimum Number of Points for Task Passing |
---|
Credit and Examination | Credit and Examination | 100 (100) | 51 |
Credit | Credit | 30 (30) | 15 |
Essay | Other task type | 15 | 0 |
Project | Semestral project | 15 | 0 |
Examination | Examination | 70 (70) | 21 |
Written exam | Written examination | 40 | 0 |
Oral exam | Oral examination | 30 | 0 |