General information:
Code:
UBPJO-249
Name:
Cybersecurity schemes in European Union Countries
Profile of education:
Academic (A)
Lecture language:
English
Semester:
Spring, Fall
Course homepage:
 
Responsible teacher:
Byrski Aleksander (olekb@agh.edu.pl)
Academic teachers:
mgr Golizda-Bliziński Marcin (marcin.golizda-blizinski@policja.gov.pl)
Module summary

Students will have knowledge of different EU approaches to cybersecurity. They will learn how to design their own cybersecurity model.

Description of learning outcomes for module
MLO code Student after module completion has the knowledge/ knows how to/is able to Connections with FLO Method of learning outcomes verification (form of completion)
Social competence
M_K001 Student will upgrade his ability to self-improvement. Presentation,
Participation in a discussion,
Completion of laboratory classes
Skills
M_U001 Student will be able to plan and realize the analytical process relevant to a given problem. Execution of laboratory classes,
Completion of laboratory classes
M_U002 Student will be able to prepare basic strategies (operations). Completion of laboratory classes,
Activity during classes
Knowledge
M_W001 Student will gain extended knowledge of the levels of cybersecurity strategies Completion of laboratory classes,
Activity during classes
M_W002 Student will gain extended knowledge of modern cybersecurity strategies. Execution of laboratory classes,
Completion of laboratory classes
FLO matrix in relation to forms of classes
MLO code Student after module completion has the knowledge/ knows how to/is able to Form of classes
Lecture
Audit. classes
Lab. classes
Project classes
Conv. seminar
Seminar classes
Pract. classes
Zaj. terenowe
Zaj. warsztatowe
Others
E-learning
Social competence
M_K001 Student will upgrade his ability to self-improvement. - - + - - - - - - - -
Skills
M_U001 Student will be able to plan and realize the analytical process relevant to a given problem. + - - - - - - - - - -
M_U002 Student will be able to prepare basic strategies (operations). - - + - - - - - - - -
Knowledge
M_W001 Student will gain extended knowledge of the levels of cybersecurity strategies + - - - - - - - - - -
M_W002 Student will gain extended knowledge of modern cybersecurity strategies. + - + - - - - - - - -
Module content
Lectures:

  • Cybersecurity domains.
  • Awareness of threats to information security and the need to counteract them.
  • Organisation of security management of computer systems in the whole country. Organisations.
  • Create, implement, maintain and develop security policies according to national cybersecurity strategies.
  • Creation, implementation, maintenance and development of national instructions for the management of the data processing systems for the whole country.
  • Cybersecurity strategy of Poland.
  • Cybersecurity strategy of Latvia.
  • Cybersecurity strategy of UK.
  • Relation between cyberdefence and cybersecurity. Polish cyberdefence strategy.
  • Ethical hacking – pen tests and legal regulations towards it. How it influences the national security.

Laboratory classes:

  • Deliverables on cybersecurity domains.
  • Discusion about cybersecurity strategies – need or must for modern countries.
  • Evaluation of cybersecurity strategies of Poland, Latvia and UK.
  • Critical infrastructure in cybersecurity strategy.
  • Discussion about EU law regulations towards cybersecurity.
  • Creation of cybersecurity strategy.
  • Students presentation on self-prepared country cybersecurity strategy.

Student workload (ECTS credits balance)
Student activity form Student workload
Summary student workload 120 h
Module ECTS credits 4 ECTS
Participation in lectures 20 h
Participation in laboratory classes 14 h
Preparation of a report, presentation, written work, etc. 30 h
Preparation for classes 25 h
Realization of independently performed tasks 29 h
Examination or Final test 2 h
Additional information
Method of calculating the final grade:

Final grade = 0.3 grade from laboratory classes + 0.2 grade from presentation + 0.5 grade from examination

Prerequisites and additional requirements:

Prerequisites and additional requirements not specified

Recommended literature and teaching resources:
  1. Polish Criminal Code.
  2. Polish Cybersecurity Strategy 2016-2020.
  3. UE Directive 2013/40/UE from 12.08.2013 about cyberattacks at IT systems.
  4. NIS Directive (Network and Information Security) 2016/1148 from 6.07.2016 about network security in EU.
  5. K. Mitnick, W.L. Simon. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. John Wiley and Sons, 2009.
  6. K.Mitnick, R.Vamosi,)M.Hypponen . The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data. Little, Brown and Company, 2017.
Scientific publications of module course instructors related to the topic of the module:

Additional scientific publications not specified

Additional information:

None