Computer Crime
2751-BW-S2-2-PK
Detailed topics presented during the lecture:
The concept of computer crime (cybercrime)
Causes of the development of computer crime
Scale of computer crime
Specificity of computer crime
Systematics of computer crimes
Characteristics of selected computer crimes:
Unauthorized access to information
Unauthorized access to information systems
Violation of the secrecy of communication
Computer fraud and forgery
Violation of information integrity
Computer sabotage
Grooming
Cyberstalking
Development trends in computer crime – the most important threats associated with cybercrime
Cyberterrorism
Security principles for computer users
Total student workload
Total Workload for the "Cybersecurity" Course (70 hours):
15 hours – Contact hours: lectures, discussions, practical exercises, and case analysis conducted during the course.
15 hours – Independent work: the student’s time dedicated to preparing for classes, including researching necessary information and materials, reading assigned documents, and analyzing case studies.
40 hours – Exam preparation: the time allocated for studying the course content in preparation for the exam, including reviewing the theoretical material, practicing with practical cases, and consolidating the knowledge acquired during the course.
Learning outcomes - knowledge
After completing the Cybersecurity course, the student:
Knowledge of terms and terminology – has basic knowledge of key concepts related to cybercrime, such as cyberterrorism, cyberstalking, cyber sabotage, and data integrity breaches.
Understanding the nature of cybercrime – understands the characteristic features of computer crime, its differences compared to traditional forms of crime, and the reasons for its rapid development.
Systematics of computer crimes – knows the classification and division of computer crimes, including the mechanisms of their commission and the most commonly used attack methods in cyberspace.
Development of threats – understands global trends in the development of cybercrime and the latest threats resulting from technological advancements, including the importance of protecting critical systems and information infrastructure.
Legal and ethical regulations – knows the basic legal regulations regarding cybercrime and the ethical standards related to the use of digital technologies and the protection of personal data.
Protection methods – has knowledge of information security principles, including preventive practices such as password management, data encryption, protection against malicious software, and system monitoring.
Cyberterrorism – knows the characteristics and potential consequences of cyberterrorist actions and their impact on international and societal security.
Principles of behavior in cyberspace – understands which actions taken by computer users can increase the risk of threats and what steps should be taken to minimize them.
Learning outcomes - skills
After completing the Cybersecurity course, the student:
Identifying threats – is able to recognize various forms of cybercrime and identify their potential consequences for individuals, organizations, and society.
Case analysis – can analyze specific cybercrime cases, such as unauthorized access to data, cyberstalking, or computer fraud, and assess their impact on information security.
Developing protection strategies – can design and implement basic security principles to protect data and systems from attacks, adapting them to the specific needs of users or organizations.
Using tools and technologies – is proficient in using tools and technologies that support cybersecurity, such as data protection, encryption, threat detection, and security audits.
Risk management – is capable of assessing the level of risk in the context of cyberspace and proposing preventive or risk-reducing actions for potential incidents.
Enhancing online protection skills – possesses practical skills in securing communication, protecting online identities, and managing privacy in the digital environment.
Knowledge sharing – can explain in an accessible manner the principles of safe internet use and methods of protection against threats in cyberspace to other computer users.
Learning outcomes - social competencies
After completing the Cybersecurity course, the student:
Awareness of threats and responsibility – understands the importance of protecting data and information systems in the social, professional, and ethical context. Demonstrates responsibility for their actions in cyberspace and can promote good security practices.
Collaboration skills – can work with a team to solve problems related to cybercrime, exchange knowledge, and communicate effectively with various stakeholders to minimize risk.
Critical thinking and proactive attitude – demonstrates the ability to critically assess threats in cyberspace and takes the initiative to search for and implement solutions that increase security in the social environment.
Ethics and respect for the law – is aware of the ethical aspects of technology use and acts in accordance with the principles of law, particularly regarding data protection and combating cybercrime.
Popularizing knowledge – is willing to share knowledge and raise social awareness about threats in cyberspace and ways to avoid them, contributing to increased security in their surroundings
Teaching methods
Teaching Methods for the course Cybersecurity:
Lecture – Presentation of theories related to cybercrime, its specifics, the classification of computer crimes, and data and system protection principles. Lectures provide students with an introduction to key theoretical issues and discussions on global and local cybercrime cases.
Practical Exercises – Case analysis related to cybercrime, solving legal problems concerning online security, and simulations of cyberattacks and protection methods. The goal of these exercises is to develop skills in applying theoretical knowledge in practice.
Discussions and Case Analysis – Open discussions on selected cybercrime cases and the analysis of real-world cyber threats. These discussions enhance argumentative and critical thinking skills.
Independent Work – Independent analysis of cybersecurity-related cases, studying source literature, and preparing for classes, which deepens knowledge in network security.
Simulations and Workshops – Practical exercises involving simulating attacks on computer systems and using tools for ensuring cybersecurity. The aim is to gain practical skills in protecting against cyber threats.
Group Projects – Team collaboration to solve problems related to cybersecurity, including designing security measures for computer systems. Group work fosters experience exchange and teamwork skills.
Observation/demonstration teaching methods
- display
Expository teaching methods
- informative (conventional) lecture
- participatory lecture
Exploratory teaching methods
- brainstorming
Prerequisites
(in Polish) Przydatne wcześniejsze zaliczenie przedmiotów podstawy prawa lub wstęp do prawoznawstwa.
Course coordinators
Assessment criteria
Written Exam (Multiple-choice test and open-ended questions):
To pass the exam, students are required to score over 50% of the total points.
Bibliography
Core literature:
Source materials:
Criminal Code, consolidated text from July 20, 2018 (Journal of Laws 2018, item 1600) - selected provisions.
Act on the National Cybersecurity System of July 5, 2018 (Journal of Laws 2018, item 1560).
Council of Europe Convention on Cybercrime of November 23, 2001.
Additional Protocol to the Council of Europe Convention on Cybercrime concerning the criminalization of acts of a racist or xenophobic nature committed through computer systems.
Studies and books:
Siwicki, M., Cybercrime, Warsaw, 2013.
Criminal Law regarding Fraud and Other Related Crimes in Online Commerce and Electronic Banking, Toruń, 2018.
Illegal and Harmful Content on the Internet: Legal and Criminal Aspects, Warsaw, 2011.
Supplementary literature:
Cybersecurity Strategy of the Republic of Poland.
Kowalewski, J., Kowalewski, M., Information Threats in Cyberspace, Cyberterrorism, Warsaw, 2017.
Occupational Health and Safety for Electronic Media Users, by K. van Laere, K. Sochocka, E. Biaduń-Korulczyk, Warsaw, 2015.
Additional information
Additional information (registration calendar, class conductors,
localization and schedules of classes), might be available in the USOSweb system: