Nicolaus Copernicus University in Torun - Central Authentication Service
Strona główna

Cybersecurity in Contemporary World

General data

Course ID: 2751-IP-S2-1-CCW
Erasmus code / ISCED: (unknown) / (1039) Security services, not elsewhere classified The ISCED (International Standard Classification of Education) code has been designed by UNESCO.
Course title: Cybersecurity in Contemporary World
Name in Polish: Cybersecurity in Contemporary World
Organizational unit: Faculty of Political and Security Sciences
Course groups: (in Polish) International Politics and Diplomacy - II stopna - 1 rok - studia stacjonarne
ECTS credit allocation (and other scores): 3.00 Basic information on ECTS credits allocation principles:
  • the annual hourly workload of the student’s work required to achieve the expected learning outcomes for a given stage is 1500-1800h, corresponding to 60 ECTS;
  • the student’s weekly hourly workload is 45 h;
  • 1 ECTS point corresponds to 25-30 hours of student work needed to achieve the assumed learning outcomes;
  • weekly student workload necessary to achieve the assumed learning outcomes allows to obtain 1.5 ECTS;
  • work required to pass the course, which has been assigned 3 ECTS, constitutes 10% of the semester student load.
Language: English
Total student workload:

(in Polish) 70 hours:




- 15 hours - contact hours;




- 15 hours - individual work of the student in order to prepare for classes: searching for necessary information and materials, reading the indicated documents;




- 40 hours - preparing for the exam.

Learning outcomes - knowledge:

(in Polish) Knowledge




Good knowledge of how the European Union (EU) regulates cybersecurity.


Knowledge of emerging cybersecurity laws.


Knowledge of relevant cybercrime norms.

Learning outcomes - skills:

(in Polish) Skills




Ability to connect technical security issues to regulatory issues discussed in the course.


Ability to participate in policy debates about emerging cybersecurity issues and their regulation at domestic, European and international level.

Observation/demonstration teaching methods:

- display
- staging

Expository teaching methods:

- description
- discussion
- informative (conventional) lecture
- narration
- problem-based lecture

Exploratory teaching methods:

- brainstorming
- practical

Online teaching methods:

- games and simulations
- integrative methods

Short description: (in Polish)

This course will introduce students to the key issues in cybersecurity and

privacy management in Internet. At the end of the course, the students will understand the set of common cybersecurity and privacy-related business challenges. This course features lectures, discussion and

analysis of real world examples/case studies, and a cybersecurity crisisresponse simulation project. Further emphasis will be placed on technologies that help to prevent, detect, and respond to cybersecurity incidents.

Full description: (in Polish)

Examples of issues to be addressed in this course:

1. The concept of computer crime (cybercrime) and cybersecurity

2. Reasons for the development of computer crime and prevention methods

3. Scale of computer crime

4. Specificity of computer crime, types of threat actors (e.g., cyber-criminals, governmentsponsored hackers, etc.) and their objectives

5. Systematics of computer crimes

6. Development trends in computer crime - the most important threats related to cybercrime

8. Cyber terrorism

9. Security principles for computer users

10. Strategies to prevent intrusions and theft of data and to detect intrusions if

they do occur

Bibliography: (in Polish)

Basic literature:

1. Source materials:

Penal Code, i.e. from 20 July 2018 (Journal of Laws of 2018, 1600) - selected provisions.

Act on the national cybersecurity system of 5 July 2018 (Journal of Laws of 2018, item 1560).

The Council of Europe Convention on Cybercrime of November 23, 2001.

Additional protocol to the Council of Europe Convention on Cybercrime regarding criminalization of racist or xenophobic acts committed using computer systems.

2. Studies:

Siwicki M., Cybercrime, Warsaw 2013.

Additional literature:

Polish cybersecurity doctrine of 2015

Polish cybersecurity strategy for 2017-2022

Kowalewski J., Kowalewski M., Information threats in cyberspace, cyberterrorism, Warsaw 2017.

Assessment methods and assessment criteria: (in Polish)

Active participation in classes (discussion of 4-5 cybersecurity issues) and presentation of work results in group classes.

Class Participation 20%; Final Project 80%

-- Written Submission (50%)

-- Simulation (50%).

Class participation is both important and required.

Classes in period "Summer semester 2021/22" (past)

Time span: 2022-02-21 - 2022-09-30
Selected timetable range:
Navigate to timetable
Type of class:
Lecture, 15 hours more information
Coordinators: Maciej Siwicki
Group instructors: Maciej Siwicki
Students list: (inaccessible to you)
Examination: Examination

Classes in period "Summer semester 2022/23" (past)

Time span: 2023-02-20 - 2023-09-30
Selected timetable range:
Navigate to timetable
Type of class:
Lecture, 15 hours more information
Coordinators: Maciej Siwicki
Group instructors: Maciej Siwicki
Students list: (inaccessible to you)
Examination: Examination

Classes in period "Summer semester 2023/24" (in progress)

Time span: 2024-02-20 - 2024-09-30
Selected timetable range:
Navigate to timetable
Type of class:
Lecture, 15 hours more information
Coordinators: Maciej Siwicki
Group instructors: Maciej Siwicki
Students list: (inaccessible to you)
Examination: Examination

Classes in period "Summer semester 2024/25" (future)

Time span: 2025-02-24 - 2025-09-30
Selected timetable range:
Navigate to timetable
Type of class:
Lecture, 15 hours more information
Coordinators: Maciej Siwicki
Group instructors: Maciej Siwicki
Students list: (inaccessible to you)
Examination: Examination
Course descriptions are protected by copyright.
Copyright by Nicolaus Copernicus University in Torun.
ul. Jurija Gagarina 11, 87-100 Toruń tel: +48 56 611-40-10 https://usosweb.umk.pl/ contact accessibility statement mapa serwisu USOSweb 7.0.3.0-2 (2024-04-26)