SubjectsSubjects(version: 945)
Course, academic year 2023/2024
   Login via CAS
Cybernality I - NSWI093
Title: Kybernalita I
Guaranteed by: Department of Software Engineering (32-KSI)
Faculty: Faculty of Mathematics and Physics
Actual: from 2008
Semester: summer
E-Credits: 3
Hours per week, examination: summer s.:2/0, Ex [HT]
Capacity: unlimited
Min. number of students: unlimited
4EU+: no
Virtual mobility / capacity: no
State of the course: cancelled
Language: Czech
Teaching methods: full-time
Teaching methods: full-time
Additional information: http://kocour.ms.mff.cuni.cz/~jirovsky/
Guarantor: doc. Ing. Václav Jirovský, CSc.
Class: Informatika Bc.
Informatika Mgr. - volitelný
Classification: Informatics > Software Engineering
Co-requisite : NSWI045
Is co-requisite for: NSWI102
Annotation -
Last update: T_KSI (07.05.2004)
The behavior of the user in computer network or in computer system from the point of law, cyber crime, the nature of cyber crime, how the cyber crime is incorporated in current law. The technology of cyber crime, theoretical background and models. What is cyberterrorisms, infoware and similar means.
Literature - Czech
Last update: T_KSI (07.05.2004)

Stephenson P.: "Investigating Computer Related Crime", CRC Press, New York 2000

Klander L.: "Hacker Proof", Unis Publishing, Brno 1998

Jirovský V.: "Vademecum správce sítě", Grada Publishing, Praha 2000

Harley C.D.: "Virus Revealed", McGraw-Hill 2001

Syllabus -
Last update: T_KSI (07.05.2004)

Basic law standards for computer systems and networks, understanding to the security and privacy in the network. Basic Czech law standards and international activities in the combat of cyber crime. The definition of cyber crime, new types of illegal behavior and its incorporation into current law. Classification of the attacks. Systems for monitoring of the traffic, role of state law enforcement agency and skilled personnel. Cybernetic attack and its characteristic, psychological and sociological aspects of cybernetic attack, life cycle of vulnerability misuse. Hackers, hackers community, type and motivation of hacker's behavior. The principles of infowar, role of intelligent agents, strategic information warfare. Principles of attack in the network, trends in attack and attackers, the phases of the attack - network scan for potential target, inverse mapping, compromising of systems, propagation of the attack, coordination and management o f the attack. Basic types of attack - DoS, fake nodes, address manipulation.

 
Charles University | Information system of Charles University | http://www.cuni.cz/UKEN-329.html