Security Threats on the Internet

Data is displayed for academic year: 2023./2024.

Course Description

The course examines threats to organizations and individuals that can be found on the Internet. The emphasis is on cybercrime, although the actions of APTs are also being studied. Methods and ways of discovering information about threats are also considered. Emphasis is on a technical aspects of threat, but touches also on legal and economic aspects.

Study Programmes

University graduate
[FER3-HR] Audio Technologies and Electroacoustics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Communication and Space Technologies - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Computational Modelling in Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Computer Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Computer Science - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Control Systems and Robotics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Data Science - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electrical Power Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electric Machines, Drives and Automation - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electronic and Computer Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electronics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Information and Communication Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Network Science - profile
Elective Courses (1. semester) (3. semester)
Elective Courses of the Profile (1. semester) (3. semester)
[FER3-HR] Software Engineering and Information Systems - profile
Elective Courses (1. semester) (3. semester)

Learning Outcomes

  1. Plan approriate methods for data protection
  2. Explain how research threat source activities on the Internte
  3. Explain intelligence work in cyber space
  4. Describe analysis of malware
  5. Describe misuse of crypto currencies
  6. Explain more frequent or more dangerous types of malware on the Internet
  7. Describe characteristics and activities of cyber criminal
  8. Describe preparation and reponse to an incident

Forms of Teaching

Lectures

Lecutes consist of lecturer's presentations and students' presentations.

Seminars and workshops

Each student has to study and present one topic from the offensive security during the lecture. Topics are proposed by the teacher.

Independent assignments

Reading papers

Laboratory

In laboratory exercises students get to know tactical and technical elements of threats.

Grading Method

Continuous Assessment Exam
Type Threshold Percent of Grade Threshold Percent of Grade
Laboratory Exercises 40 % 20 % 40 % 20 %
Class participation 40 % 40 % 40 % 40 %
Mid Term Exam: Written 40 % 20 % 50 %
Final Exam: Written 40 % 20 %

Week by Week Schedule

  1. Introduction
  2. Cybercrime
  3. Anonymization networks on the Internet, Darkweb, Darknet.
  4. Cyber threat intelligence.
  5. Cyber threat intelligence.
  6. Botnet: technical and economic characteristics.
  7. Malware taxonomy
  8. Midterm exam
  9. Ransomware - technical and economic aspects, protection
  10. Social engineering
  11. Advanced persistent threats.
  12. Case study
  13. Case study
  14. Incident management
  15. Final exam

Literature

Brian Krebs (2014.), Spam Nation, Sourcebooks, Inc.
Man Young Rhee (2003.), Internet Security, John Wiley & Sons
Scott J Roberts, Rebekah Brown (2017.), Intelligence-Driven Incident Response, "O'Reilly Media, Inc."

For students

General

ID 222654
  Winter semester
5 ECTS
L0 English Level
L1 e-Learning
30 Lectures
0 Seminar
0 Exercises
12 Laboratory exercises
0 Project laboratory
0 Physical education excercises

Grading System

88 Excellent
75 Very Good
63 Good
50 Sufficient