Uniwersytet Mikołaja Kopernika w Toruniu - Centralny punkt logowania
Strona główna

Cybersecurity in Contemporary World

Informacje ogólne

Kod przedmiotu: 2751-IP-S2-1-CCW
Kod Erasmus / ISCED: (brak danych) / (1039) Security services, not elsewhere classified Kod ISCED - Międzynarodowa Standardowa Klasyfikacja Kształcenia (International Standard Classification of Education) została opracowana przez UNESCO.
Nazwa przedmiotu: Cybersecurity in Contemporary World
Jednostka: Wydział Nauk o Polityce i Bezpieczeństwie
Grupy: International Politics and Diplomacy - II stopna - 1 rok - studia stacjonarne
Punkty ECTS i inne: 3.00 Podstawowe informacje o zasadach przyporządkowania punktów ECTS:
  • roczny wymiar godzinowy nakładu pracy studenta konieczny do osiągnięcia zakładanych efektów uczenia się dla danego etapu studiów wynosi 1500-1800 h, co odpowiada 60 ECTS;
  • tygodniowy wymiar godzinowy nakładu pracy studenta wynosi 45 h;
  • 1 punkt ECTS odpowiada 25-30 godzinom pracy studenta potrzebnej do osiągnięcia zakładanych efektów uczenia się;
  • tygodniowy nakład pracy studenta konieczny do osiągnięcia zakładanych efektów uczenia się pozwala uzyskać 1,5 ECTS;
  • nakład pracy potrzebny do zaliczenia przedmiotu, któremu przypisano 3 ECTS, stanowi 10% semestralnego obciążenia studenta.
Język prowadzenia: angielski
Wymagania wstępne:

(tylko po angielsku) Language Proficiency:

A good command of English (at least B2 level) is required, as the course materials, lectures, and discussions will be conducted in English.



Familiarity with basic computer operations and internet usage.

Understanding of general IT concepts (e.g., operating systems, software applications) is recommended.


Open-mindedness and Analytical Thinking:

Willingness to participate in discussions, analyze case studies, and solve real-world problems related to cybersecurity.

Całkowity nakład pracy studenta:

(tylko po angielsku) 70 hours:


- 15 hours - contact hours;


- 15 hours - individual work of the student in order to prepare for classes: searching for necessary information and materials, reading the indicated documents;


- 40 hours - preparing for the exam.

Efekty uczenia się - wiedza:

Knowledge




Good knowledge of how the European Union (EU) regulates cybersecurity.


Knowledge of emerging cybersecurity laws.


Knowledge of relevant cybercrime norms.

Efekty uczenia się - umiejętności:


Efekty uczenia się - kompetencje społeczne:

(tylko po angielsku) Learning Outcomes - Social Competencies:


Recognizes the importance of cybersecurity as a shared responsibility and promotes a culture of digital safety within various environments.

Demonstrates ethical awareness and responsibility in addressing issues related to cybercrime and data protection.

Collaborates effectively with others to develop and implement cybersecurity measures and policies.

Shows readiness to engage in lifelong learning to stay informed about evolving cyber threats and legal frameworks.

Acts proactively to identify and mitigate cybersecurity risks, considering the impact on individuals, organizations, and society.

Respects legal and ethical standards when handling sensitive information or responding to cybersecurity incidents.

Encourages awareness and compliance with cybersecurity best practices among peers and professional networks.

Metody dydaktyczne:

(tylko po angielsku) Lectures – Structured presentations to introduce key concepts, theories, and legal frameworks related to cybersecurity and cybercrime.

Case Studies – Analysis of real-world cybercrime incidents to understand threat actor behavior and evaluate response strategies.

Workshops – Interactive sessions to practice cybersecurity tools, prevention techniques, and intrusion detection methods.

Group Discussions – Collaborative exploration of cybersecurity challenges and trends, encouraging critical thinking and diverse perspectives.

Legal Analysis – In-depth examination of Polish and EU regulations to understand their application in combating cybercrime.

Metody dydaktyczne eksponujące:

- inscenizacja
- pokaz

Metody dydaktyczne podające:

- opis
- opowiadanie
- pogadanka
- wykład informacyjny (konwencjonalny)
- wykład problemowy

Metody dydaktyczne poszukujące:

- ćwiczeniowa
- giełda pomysłów

Metody dydaktyczne w kształceniu online:

- gry i symulacje
- metody integracyjne

Skrócony opis: (tylko po angielsku)

This course explores the essential aspects of cybersecurity and privacy management in the digital age, with a focus on common business challenges. Students will gain a comprehensive understanding of threats to cybersecurity and privacy, and the strategies and technologies used to mitigate these risks.

The course combines lectures, discussions, and real-world case studies to analyze cyber incidents and their impact on organizations. Students will also engage in a cybersecurity crisis-response simulation project, enhancing their practical skills in handling security breaches. Emphasis is placed on tools and technologies that prevent, detect, and respond to cybersecurity incidents effectively, preparing students to address challenges in a rapidly evolving cyber landscape.

Pełny opis: (tylko po angielsku)

etailed 15-Hour Plan: Cybersecurity in the Contemporary World (with Student Presentations)

1. Introduction to Cybersecurity and Cybercrime (2 Hours)

Topics Covered:

Definitions of cybersecurity and cybercrime.

Importance of cybersecurity in the modern world.

Overview of computer crime and its legal and technical aspects.

Activities:

Lecture on foundational concepts.

Assignment of presentation topics to students.

2. Scale and Drivers of Cybercrime (2 Hours)

Topics Covered:

Factors contributing to the growth of cybercrime (technological, social, economic).

Scale and impact of cybercrime globally, with statistical examples.

Activities:

Student presentations:

Topic Examples: "Economic Costs of Cybercrime" or "How Technology Enables Modern Cyber Threats."

Group discussion to reflect on presented ideas.

3. Threat Actors and Motivations (2 Hours)

Topics Covered:

Types of cyber threat actors (cybercriminals, hacktivists, insider threats, state-sponsored hackers).

Objectives behind cybercrimes (financial, political, espionage, ideological).

Activities:

Student presentations:

Topic Examples: "State-Sponsored Cyber Attacks: Case Studies" or "Motivations of Hacktivists in Cybercrime."

Class discussion on the diversity of threat actors and their global implications.

4. Classification and Trends in Cybercrime (2 Hours)

Topics Covered:

Systematics of cybercrimes: financial crimes, ransomware, phishing, etc.

Emerging trends: AI-powered cyberattacks, IoT vulnerabilities, ransomware-as-a-service.

Activities:

Student presentations:

Topic Examples: "Ransomware: The Fastest Growing Cyber Threat" or "Impact of IoT Vulnerabilities on Security."

Brainstorming session on mitigating future cybercrime trends.

5. Cyber Terrorism and Its Implications (2 Hours)

Topics Covered:

Defining and understanding cyber terrorism.

Examples of cyber terrorism incidents and their consequences for global security.

Challenges in addressing cyber terrorism.

Activities:

Student presentations:

Topic Examples: "Cyber Terrorism: Threats to Critical Infrastructure" or "Global Response Strategies to Cyber Terrorism."

Class debate on whether current countermeasures are sufficient.

6. Prevention, Detection, and Response Strategies (3 Hours)

Topics Covered:

Principles of cybersecurity for users and organizations.

Tools for intrusion prevention and detection (IDS/IPS, SIEM).

Incident response and recovery strategies.

Activities:

Student presentations:

Topic Examples: "Best Practices for Cyber Hygiene" or "Technologies for Intrusion Detection and Response."

Class simulation: Teams respond to a simulated security breach and present their solutions.

7. Final Review, Crisis-Response Simulation, and Wrap-Up (2 Hours)

Topics Covered:

Recap of key themes: cybercrime types, trends, threat actors, and defense strategies.

Course takeaways and reflections.

Activities:

Students present final crisis-response simulation project:

Scenario Examples: Ransomware attack on a hospital or phishing campaign targeting a financial institution.

Group feedback on presentations.

Instructor-led discussion summarizing lessons learned and future directions in cybersecurity.

Literatura: (tylko po angielsku)

Basic literature:

1. Source materials:

Penal Code, i.e. from 20 July 2018 (Journal of Laws of 2018, 1600) - selected provisions.

Act on the national cybersecurity system of 5 July 2018 (Journal of Laws of 2018, item 1560).

The Council of Europe Convention on Cybercrime of November 23, 2001.

Additional protocol to the Council of Europe Convention on Cybercrime regarding criminalization of racist or xenophobic acts committed using computer systems.

2. Studies:

Siwicki M., Cybercrime, Warsaw 2013.

Additional literature:

Polish cybersecurity doctrine of 2015

Polish cybersecurity strategy for 2017-2022

Kowalewski J., Kowalewski M., Information threats in cyberspace, cyberterrorism, Warsaw 2017.

Metody i kryteria oceniania: (tylko po angielsku)

Active participation in classes (discussion of 4-5 cybersecurity issues) and presentation of work results in group classes.

Class Participation 20%; Final Project 80%

-- Written Submission (50%)

-- Simulation (50%).

Class participation is both important and required.

Zajęcia w cyklu "Semestr letni 2022/23" (zakończony)

Okres: 2023-02-20 - 2023-09-30
Wybrany podział planu:
Przejdź do planu
Typ zajęć:
Wykład, 15 godzin więcej informacji
Koordynatorzy: Maciej Siwicki
Prowadzący grup: Maciej Siwicki
Lista studentów: (nie masz dostępu)
Zaliczenie: Egzamin

Zajęcia w cyklu "Semestr letni 2023/24" (zakończony)

Okres: 2024-02-20 - 2024-09-30
Wybrany podział planu:
Przejdź do planu
Typ zajęć:
Wykład, 15 godzin więcej informacji
Koordynatorzy: Maciej Siwicki
Prowadzący grup: Maciej Siwicki
Lista studentów: (nie masz dostępu)
Zaliczenie: Egzamin

Zajęcia w cyklu "Semestr letni 2024/25" (w trakcie)

Okres: 2025-02-24 - 2025-09-20
Wybrany podział planu:
Przejdź do planu
Typ zajęć:
Wykład, 15 godzin więcej informacji
Koordynatorzy: Maciej Siwicki
Prowadzący grup: Maciej Siwicki
Lista studentów: (nie masz dostępu)
Zaliczenie: Egzamin
Opisy przedmiotów w USOS i USOSweb są chronione prawem autorskim.
Właścicielem praw autorskich jest Uniwersytet Mikołaja Kopernika w Toruniu.
ul. Jurija Gagarina 11, 87-100 Toruń tel: +48 56 611-40-10 https://usosweb.umk.pl/ kontakt deklaracja dostępności mapa serwisu USOSweb 7.1.1.0-7 (2025-03-24)