Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

MI-KYB.16 Cybernality Extent of teaching: 2P
Instructor: Completion: ZK
Department: 18106 Credits: 5 Semester: Z

Annotation:
Students get acquainted with the fundamentals of legislation and international activities in the area of fighting cybercrime. Students will understand the classification of attacks and have an overview of systems for computer surveillance and traffic monitoring in the cyberspace. Students will also familiarize themselves with hacker activities and behavior. The course will also discuss the cooperation of the state agencies and subjects dealing with defence of the cyberspace (especially CSIRT and CERT teams).

Lecture syllabus:
1. Introduction to Cybernality.
2. Legal norms regulating cyberspace.
3. ISP Regulations.
4. Contracts and Licences.
5. Copyright.
6. Botnets.
7. Cybernetic attacks (hacking, cracking, malware).
8. Cybernetic attacks (data theft, DoS, DDoS, cyberstalking, etc.).
9. Cybernetic attacks (financially motivated attacks - phishing pharming, mobile phishing).
10. Games and Social Networks.
11. Activities of LEA.
12. The Cyber Security Act.
13. CERT/CSIRT. Public Private Partnership. Summary.

Seminar syllabus:

Literature:
1. CASEY, E. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, Second Edition. London : Academic Press, 2004. 677 s. ISBN 0-12-163104-4.
2. ENISA. Botnets: Measurement, Detection, Disinfection and Defence. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/botnets/botnets-measurement-detection-disinfection-and-defence.
3. HARLEY, D., SLADE, R. ''Viruses Revealed''. McGraw-Hill, 2001. ISBN 0072130903.
4. KLANDER, L., RENEHAN, E. J. ''Hacker Proof : The Ultimate Guide to Network Security''. Jamsa Press, 1997. ISBN 188413355X.

Requirements:

Informace o předmětu a výukové materiály naleznete na https://courses.fit.cvut.cz/MI-KYB/index.html

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
NI-TI.2018 Computer Science V 1,3
MI-ZI.2016 Knowledge Engineering VH 3
MI-ZI.2018 Knowledge Engineering VH 3
MI-SP-TI.2016 System Programming VH 3
MI-SP-SP.2016 System Programming VH 3
MI-SPOL.2016 Unspecified Branch/Specialisation of Study VH 3
MI-WSI-WI.2016 Web and Software Engineering VH 3
MI-WSI-SI.2016 Web and Software Engineering VH 3
MI-WSI-ISM.2016 Web and Software Engineering VH 3
MI-NPVS.2016 Design and Programming of Embedded Systems VH 3
MI-PSS.2016 Computer Systems and Networks VH 3
MI-PB.2016 Computer Security VH 3


Page updated 28. 3. 2024, semester: Z/2023-4, L/2019-20, L/2022-3, Z/2019-20, Z/2022-3, L/2020-1, L/2023-4, Z/2020-1, Z,L/2021-2, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška