Lecturer(s)
|
-
Bureš Pavel, JUDr. Ph.D.
-
Bělohlávek Radim, prof. RNDr. Ph.D., DSc.
-
Outrata Jan, doc. Mgr. Ph.D.
|
Course content
|
1. Security of computer systems and software: users, access mechanisms and rights, recording and monitoring of system activity; software and hardware vulnerabilities, malware; system security and secure software. 2. Security of computer networks: types of attacks and defences, basics of cryptography, PKI (certificates, e-signatures) and authentication; security of network technologies (LAN, Wi-Fi, mobile); security of networks on the Internet (firewall, tunnelling, VPN); security of Internet services. 3. Cyber security and cybercrime: personal data and GDPR, data security, online security, digital rights (DRM), anonymity on the Internet (digital footprint, social networks); intrusion into and misuse of computer systems and networks, data corruption and theft, national security teams (CSIRTs); manifestations and motives of cybercrime (social engineering, malware, spam, phishing, malicious content, etc.), law in cyberspace and investigations, forensics
|
Learning activities and teaching methods
|
Monologic Lecture(Interpretation, Training)
|
Learning outcomes
|
Information Technology for Law and Legal Science 2, which is taught in English language, is the second part of a three-semester course. It focuses on computer security from an IT/IT perspective and on selected aspects of related legal and social issues. It is intended for students of social sciences and assumes only basic knowledge of information technology, within the scope of the first part of the course. The content of the course covers issues of local security of computer systems and software, attacks on computer networks, on network services and their security, and issues of (un)secure behaviour on the Internet (cyber-security and cyber-crime). 1. Security of computer systems and software: users, access mechanisms and rights, recording and monitoring of system activity; software and hardware vulnerabilities, malicious software; system security and secure software. 2. Security of computer networks: types of attacks and defences, basics of cryptography, PKI (certificates, e-signatures) and authentication; security of network technologies (LAN, Wi-Fi, mobile); security of networks on the Internet (firewall, tunnelling, VPN); security of Internet services. 3.Cyber security and cybercrime: personal data and GDPR, data security, online security, digital rights (DRM), anonymity on the Internet (digital footprint, social networks); intrusion into and misuse of computer systems and networks, data corruption and theft, national security teams (CSIRTs); manifestations and motives of cybercrime (social engineering, malware, spam, phishing, malicious content, etc.), law in cyberspace and investigations, forensics.
Students will gain an introductory knowledge of computer security issues from an IT/IT perspective and from the perspective of selected aspects of related legal and societal issues
|
Prerequisites
|
Completion of this course is contingent upon completion of Information Technology for Law and Legal Science 1
MEP/TIT1
|
Assessment methods and criteria
|
Student performance
A full-time student is required to attend 80% of the course lectures. A combined form student is required to attend at least 30% of the lectures and one tutorial with the lecturer.
|
Recommended literature
|
-
BANDLER, J., MERZON, A. (2022). Cybercrime Investigations.. CRC Press.
-
BROOKS, CH., J., GROW, CH., CRAIG, P., A., JR., SHORT, D. (2018). Cybersecurity Essentials. Sybex.
-
DU, W. (2022). Computer Security: A Hands-on Approach (Computer & Internet Security), (3rd ed.). Wenliang Du.
-
DU, W. (2022). Internet Security: A Hands-on Approach (Computer & Internet Security), (3rd ed.). Wenliang Du.
-
EASTTOM, W. (2023). Computer Security Fundamentals, (5th edition). Pearson IT Certification.
-
GRUBB, S. (2021). How Cybersecurity Really Works: A Hands-On Guide for Total Beginners. No Starch press.
-
KAUFMAN, CH., PERLMAN, R., SPECINER, M., PERLNER, R. (2022). Network Security: Private Communication in a Public World, (3rd edition). Addison-Wesley Professional.
|