Security Threats on the Internet

Data is displayed for academic year: 2023./2024.

Course Description

The course examines threats to organizations and individuals that can be found on the Internet. The emphasis is on cybercrime, although the actions of APTs are also being studied. Methods and ways of discovering information about threats are also considered. Emphasis is on a technical aspects of threat, but touches also on legal and economic aspects.

Study Programmes

University graduate
[FER3-HR] Audio Technologies and Electroacoustics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Communication and Space Technologies - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Computational Modelling in Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Computer Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Computer Science - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Control Systems and Robotics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Data Science - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electrical Power Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electric Machines, Drives and Automation - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electronic and Computer Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electronics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Information and Communication Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Network Science - profile
Elective Courses (1. semester) (3. semester)
Elective Courses of the Profile (1. semester) (3. semester)
[FER3-HR] Software Engineering and Information Systems - profile
Elective Courses (1. semester) (3. semester)

Learning Outcomes

  1. Analyze security incidents
  2. Protect data on the Internet
  3. Perform cyber threat intelligence
  4. Estimate the level of protection of data on the Internet

Forms of Teaching

Lectures

Lectures.

Independent assignments

Reading papers

Laboratory

Laboratory exercises.

Grading Method

Continuous Assessment Exam
Type Threshold Percent of Grade Threshold Percent of Grade
Laboratory Exercises 20 % 30 % 20 % 30 %
Class participation 20 % 30 % 20 % 30 %
Mid Term Exam: Written 20 % 20 % 50 %
Final Exam: Written 20 % 20 %

Week by Week Schedule

  1. Introduction
  2. Cybercrime
  3. Anonymization networks on the Internet, Darkweb, Darknet.
  4. Cyber threat intelligence.
  5. Cyber threat intelligence.
  6. Botnet: technical and economic characteristics.
  7. Malware taxonomy
  8. Midterm exam
  9. Ransomware - technical and economic aspects, protection
  10. Social engineering
  11. Advanced persistent threats.
  12. Case study
  13. Case study
  14. Guest Lecturer from Industry - overview of current procedures and practices
  15. Final exam

Literature

Brian Krebs (2014.), Spam Nation, Sourcebooks, Inc.
(.), Man Young Rhee. Internet Security: Cryptographic Principles, Algorithms and Protocols. Man Young Rhee,
(.), Scott J. Roberts, Rebekah Brown. Intelligence-Driven Incident Response: Outwitting the Adversary.,

For students

General

ID 222654
  Winter semester
5 ECTS
L0 English Level
L1 e-Learning
30 Lectures
0 Seminar
0 Exercises
12 Laboratory exercises
0 Project laboratory
0 Physical education excercises

Grading System

88 Excellent
75 Very Good
63 Good
50 Sufficient