Course: Information Technology for Law and Legal Science 2

« Back
Course title Information Technology for Law and Legal Science 2
Course code MEP/TIT2
Organizational form of instruction Lecture
Level of course Doctoral
Year of study 1
Semester Summer
Number of ECTS credits 8
Language of instruction English
Status of course Compulsory
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Bureš Pavel, JUDr. Ph.D.
  • Bělohlávek Radim, prof. RNDr. Ph.D., DSc.
  • Outrata Jan, doc. Mgr. Ph.D.
Course content
1. Security of computer systems and software: users, access mechanisms and rights, recording and monitoring of system activity; software and hardware vulnerabilities, malware; system security and secure software. 2. Security of computer networks: types of attacks and defences, basics of cryptography, PKI (certificates, e-signatures) and authentication; security of network technologies (LAN, Wi-Fi, mobile); security of networks on the Internet (firewall, tunnelling, VPN); security of Internet services. 3. Cyber security and cybercrime: personal data and GDPR, data security, online security, digital rights (DRM), anonymity on the Internet (digital footprint, social networks); intrusion into and misuse of computer systems and networks, data corruption and theft, national security teams (CSIRTs); manifestations and motives of cybercrime (social engineering, malware, spam, phishing, malicious content, etc.), law in cyberspace and investigations, forensics

Learning activities and teaching methods
Monologic Lecture(Interpretation, Training)
Learning outcomes
Information Technology for Law and Legal Science 2, which is taught in English language, is the second part of a three-semester course. It focuses on computer security from an IT/IT perspective and on selected aspects of related legal and social issues. It is intended for students of social sciences and assumes only basic knowledge of information technology, within the scope of the first part of the course. The content of the course covers issues of local security of computer systems and software, attacks on computer networks, on network services and their security, and issues of (un)secure behaviour on the Internet (cyber-security and cyber-crime). 1. Security of computer systems and software: users, access mechanisms and rights, recording and monitoring of system activity; software and hardware vulnerabilities, malicious software; system security and secure software. 2. Security of computer networks: types of attacks and defences, basics of cryptography, PKI (certificates, e-signatures) and authentication; security of network technologies (LAN, Wi-Fi, mobile); security of networks on the Internet (firewall, tunnelling, VPN); security of Internet services. 3.Cyber security and cybercrime: personal data and GDPR, data security, online security, digital rights (DRM), anonymity on the Internet (digital footprint, social networks); intrusion into and misuse of computer systems and networks, data corruption and theft, national security teams (CSIRTs); manifestations and motives of cybercrime (social engineering, malware, spam, phishing, malicious content, etc.), law in cyberspace and investigations, forensics.
Students will gain an introductory knowledge of computer security issues from an IT/IT perspective and from the perspective of selected aspects of related legal and societal issues
Prerequisites
Completion of this course is contingent upon completion of Information Technology for Law and Legal Science 1
MEP/TIT1

Assessment methods and criteria
Student performance

A full-time student is required to attend 80% of the course lectures. A combined form student is required to attend at least 30% of the lectures and one tutorial with the lecturer.
Recommended literature
  • BANDLER, J., MERZON, A. (2022). Cybercrime Investigations.. CRC Press.
  • BROOKS, CH., J., GROW, CH., CRAIG, P., A., JR., SHORT, D. (2018). Cybersecurity Essentials. Sybex.
  • DU, W. (2022). Computer Security: A Hands-on Approach (Computer & Internet Security), (3rd ed.). Wenliang Du.
  • DU, W. (2022). Internet Security: A Hands-on Approach (Computer & Internet Security), (3rd ed.). Wenliang Du.
  • EASTTOM, W. (2023). Computer Security Fundamentals, (5th edition). Pearson IT Certification.
  • GRUBB, S. (2021). How Cybersecurity Really Works: A Hands-On Guide for Total Beginners. No Starch press.
  • KAUFMAN, CH., PERLMAN, R., SPECINER, M., PERLNER, R. (2022). Network Security: Private Communication in a Public World, (3rd edition). Addison-Wesley Professional.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester
Faculty: Faculty of Law Study plan (Version): - (PADT24) Category: Law, legal and public administration proceeding 1 Recommended year of study:1, Recommended semester: Summer
Faculty: Faculty of Law Study plan (Version): - (PADT24) Category: Law, legal and public administration proceeding 1 Recommended year of study:1, Recommended semester: Summer