Cybersecurity in Contemporary World 2751-IP-S2-1-CCW
etailed 15-Hour Plan: Cybersecurity in the Contemporary World (with Student Presentations)
1. Introduction to Cybersecurity and Cybercrime (2 Hours)
Topics Covered:
Definitions of cybersecurity and cybercrime.
Importance of cybersecurity in the modern world.
Overview of computer crime and its legal and technical aspects.
Activities:
Lecture on foundational concepts.
Assignment of presentation topics to students.
2. Scale and Drivers of Cybercrime (2 Hours)
Topics Covered:
Factors contributing to the growth of cybercrime (technological, social, economic).
Scale and impact of cybercrime globally, with statistical examples.
Activities:
Student presentations:
Topic Examples: "Economic Costs of Cybercrime" or "How Technology Enables Modern Cyber Threats."
Group discussion to reflect on presented ideas.
3. Threat Actors and Motivations (2 Hours)
Topics Covered:
Types of cyber threat actors (cybercriminals, hacktivists, insider threats, state-sponsored hackers).
Objectives behind cybercrimes (financial, political, espionage, ideological).
Activities:
Student presentations:
Topic Examples: "State-Sponsored Cyber Attacks: Case Studies" or "Motivations of Hacktivists in Cybercrime."
Class discussion on the diversity of threat actors and their global implications.
4. Classification and Trends in Cybercrime (2 Hours)
Topics Covered:
Systematics of cybercrimes: financial crimes, ransomware, phishing, etc.
Emerging trends: AI-powered cyberattacks, IoT vulnerabilities, ransomware-as-a-service.
Activities:
Student presentations:
Topic Examples: "Ransomware: The Fastest Growing Cyber Threat" or "Impact of IoT Vulnerabilities on Security."
Brainstorming session on mitigating future cybercrime trends.
5. Cyber Terrorism and Its Implications (2 Hours)
Topics Covered:
Defining and understanding cyber terrorism.
Examples of cyber terrorism incidents and their consequences for global security.
Challenges in addressing cyber terrorism.
Activities:
Student presentations:
Topic Examples: "Cyber Terrorism: Threats to Critical Infrastructure" or "Global Response Strategies to Cyber Terrorism."
Class debate on whether current countermeasures are sufficient.
6. Prevention, Detection, and Response Strategies (3 Hours)
Topics Covered:
Principles of cybersecurity for users and organizations.
Tools for intrusion prevention and detection (IDS/IPS, SIEM).
Incident response and recovery strategies.
Activities:
Student presentations:
Topic Examples: "Best Practices for Cyber Hygiene" or "Technologies for Intrusion Detection and Response."
Class simulation: Teams respond to a simulated security breach and present their solutions.
7. Final Review, Crisis-Response Simulation, and Wrap-Up (2 Hours)
Topics Covered:
Recap of key themes: cybercrime types, trends, threat actors, and defense strategies.
Course takeaways and reflections.
Activities:
Students present final crisis-response simulation project:
Scenario Examples: Ransomware attack on a hospital or phishing campaign targeting a financial institution.
Group feedback on presentations.
Instructor-led discussion summarizing lessons learned and future directions in cybersecurity.
Total student workload
Learning outcomes - knowledge
Learning outcomes - skills
Learning outcomes - social competencies
Teaching methods
Observation/demonstration teaching methods
- staging
Expository teaching methods
- narration
- informative (conventional) lecture
- discussion
- problem-based lecture
Exploratory teaching methods
- brainstorming
Online teaching methods
- games and simulations
Prerequisites
Course coordinators
Assessment criteria
Active participation in classes (discussion of 4-5 cybersecurity issues) and presentation of work results in group classes.
Class Participation 20%; Final Project 80%
-- Written Submission (50%)
-- Simulation (50%).
Class participation is both important and required.
Additional information
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: