Objectives and competences
- Upgrade understanding of information security as a basic aspect of a comprehensive information security for achieving work goals and global connectivity.
- To introduce the technology and how to use it in the information society and the needs and reasons for protecting information assets.
- Upgrade the understanding and control of safe exchange of information and technologies necessary to provide secure exchange of information.
- Upgrade knowledge in achieving personal and organizational goals, and provide the basis for safe work in the real and cyberspace by reducing the misuse of information and privacy.
Content (Syllabus outline)
- Modern cybersecurity
- National and International cybersecurity strategies
- Modern technology in cyberspace, use and risks to users
o the business and personal aspects
- International Environment and cybersecurity
- The impact of cyberspace on security and privacy
o Harassment, hate speech, stalking, ...
o whistlers: the impact on the security and privacy of cyberspace
o manipulations: Disinformation and Fake News, Online Propaganda and Influence Campaigns, Manipulative Algorithms, Deepfakes
o Cripto markets
o Deep and dark web
- Community Cyber Security Maturity Model
- Cybersecurity legislative frameworks and international consistency
- Critical infrastructures
- Cybercrime
- Cyberwarfare
- Cyber terrorism
Learning and teaching methods
The subject will consist of lectures, tutorials, case studies, discussions on current topics, group and individual consultations and preparation of seminar papers. Special attention is focused on students' active participation in discussions and exercises.
Intended learning outcomes - knowledge and understanding
The course students develop an understanding of information security technologies to ensure an adequate level of security and protection of information assets of persons and organizations. Learn about the tools and methods for security testing of the systems in the cyberspace.
Intended learning outcomes - transferable/key skills and other attributes
Students build on and further understanding of information security, the preservation of their values and ways of misuse of the information in the real and cyberspace by understanding the latest, most advanced trends.
Readings
- Bernik, I. (2014). Cybercrime and cyberwarfare. ISTE; Wiley.
- Tomažič, S. in Bernik, I. (2019). Cyberattack response model for the nuclear regulator in Slovenia. Journal of Universal Computer Science, 25(11), 1437–1457.
- Prislan Mihelič, K., Mihelič, A. in Bernik, I. (2020). A real-world information security performance assessment using a multidimensional socio-technical approach. PloS one, 15(9). http://dx.doi.org/10.1371/journal.pone.0238739
- Fujs, D. in Bernik, I. (2022). Characterization of selected security-related standards in the field of security requirements engineering. Elektrotehniški vestnik, 89(3), 73–80.
Prerequisits
Basic understanding of ICT and information security.
Additional information on implementation and assessment /