Cybersecurity: Prevention and Regulation 2751-15-KONJA-CPR
Detailed 15-Hour Plan: Cybersecurity in the Contemporary World (with Student Presentations)
1. Introduction to Cybersecurity and Cybercrime (2 Hours)
Topics Covered:
Definitions of cybersecurity and cybercrime.
Importance of cybersecurity in the modern world.
Overview of computer crime and its legal and technical aspects.
Activities:
Lecture on foundational concepts.
Assignment of presentation topics to students.
2. Scale and Drivers of Cybercrime (2 Hours)
Topics Covered:
Factors contributing to the growth of cybercrime (technological, social, economic).
Scale and impact of cybercrime globally, with statistical examples.
Activities:
Student presentations:
Topic Examples: "Economic Costs of Cybercrime" or "How Technology Enables Modern Cyber Threats."
Group discussion to reflect on presented ideas.
3. Threat Actors and Motivations (2 Hours)
Topics Covered:
Types of cyber threat actors (cybercriminals, hacktivists, insider threats, state-sponsored hackers).
Objectives behind cybercrimes (financial, political, espionage, ideological).
Activities:
Student presentations:
Topic Examples: "State-Sponsored Cyber Attacks: Case Studies" or "Motivations of Hacktivists in Cybercrime."
Class discussion on the diversity of threat actors and their global implications.
4. Classification and Trends in Cybercrime (2 Hours)
Topics Covered:
Systematics of cybercrimes: financial crimes, ransomware, phishing, etc.
Emerging trends: AI-powered cyberattacks, IoT vulnerabilities, ransomware-as-a-service.
Activities:
Student presentations:
Topic Examples: "Ransomware: The Fastest Growing Cyber Threat" or "Impact of IoT Vulnerabilities on Security."
Brainstorming session on mitigating future cybercrime trends.
5. Cyber Terrorism and Its Implications (2 Hours)
Topics Covered:
Defining and understanding cyber terrorism.
Examples of cyber terrorism incidents and their consequences for global security.
Challenges in addressing cyber terrorism.
Activities:
Student presentations:
Topic Examples: "Cyber Terrorism: Threats to Critical Infrastructure" or "Global Response Strategies to Cyber Terrorism."
Class debate on whether current countermeasures are sufficient.
6. Prevention, Detection, and Response Strategies (3 Hours)
Topics Covered:
Principles of cybersecurity for users and organizations.
Tools for intrusion prevention and detection (IDS/IPS, SIEM).
Incident response and recovery strategies.
Activities:
Student presentations:
Topic Examples: "Best Practices for Cyber Hygiene" or "Technologies for Intrusion Detection and Response."
Class simulation: Teams respond to a simulated security breach and present their solutions.
7. Final Review, Crisis-Response Simulation, and Wrap-Up (2 Hours)
Topics Covered:
Recap of key themes: cybercrime types, trends, threat actors, and defense strategies.
Course takeaways and reflections.
Activities:
Students present final crisis-response simulation project:
Scenario Examples: Ransomware attack on a hospital or phishing campaign targeting a financial institution.
Group feedback on presentations.
Instructor-led discussion summarizing lessons learned and future directions in cybersecurity.
Całkowity nakład pracy studenta
Efekty uczenia się - wiedza
Efekty uczenia się - umiejętności
Efekty uczenia się - kompetencje społeczne
Metody dydaktyczne eksponujące
- inscenizacja
Metody dydaktyczne podające
- opowiadanie
Metody dydaktyczne poszukujące
- giełda pomysłów
- obserwacji
- seminaryjna
Metody dydaktyczne w kształceniu online
Wymagania wstępne
Koordynatorzy przedmiotu
Kryteria oceniania
Active participation in classes (discussion of 4-5 cybersecurity issues) and presentation of work results in group classes.
Class Participation 20%; Final Project 80%
-- Written Submission (50%)
-- Simulation (50%).
Class participation is both important and required.
Literatura
Basic literature:
1. Source materials:
Penal Code, i.e. from 20 July 2018 (Journal of Laws of 2018, 1600) - selected provisions.
Act on the national cybersecurity system of 5 July 2018 (Journal of Laws of 2018, item 1560).
The Council of Europe Convention on Cybercrime of November 23, 2001.
Additional protocol to the Council of Europe Convention on Cybercrime regarding criminalization of racist or xenophobic acts committed using computer systems.
2. Studies:
Siwicki M., Cybercrime, Warsaw 2013.
Additional literature:
Polish cybersecurity doctrine of 2015
Polish cybersecurity strategy for 2017-2022
Kowalewski J., Kowalewski M., Information threats in cyberspace, cyberterrorism, Warsaw 2017.
Więcej informacji
Dodatkowe informacje (np. o kalendarzu rejestracji, prowadzących zajęcia, lokalizacji i terminach zajęć) mogą być dostępne w serwisie USOSweb: