N_POKR Cybercriminality

University of Finance and Administration
Summer 2016
Extent and Intensity
2/0. 3 credit(s). Type of Completion: z (credit).
Teacher(s)
prof. PhDr. Jiří Straus, DrSc. (seminar tutor)
Guaranteed by
prof. PhDr. Jiří Straus, DrSc.
Department of Law – Departments – University of Finance and Administration
Contact Person: Hana Víchová
Supplier department: Department of Law – Departments – University of Finance and Administration
Prerequisites
There are no prerequisites for this course.
Course Enrolment Limitations
The course is offered to students of any study field.
Course objectives
Students can describe basic forms of cyber crime, the typical methods of perpetration and concealment. Understand the use of investigative techniques in the analysis of physical and digital tracks; able legal and criminological characteristics of cybercrime; understand the subject of the inquiry and investigation initiatives; can make an essential pre-trial version. He can choose the appropriate initial and urgent tasks of investigation and is able to apply the results of forensic research in the subsequent stage of the investigation. He can lay down the basic methods of prevention. It is able to evaluate and apply basic forensic methods in investigating computer crime. Vrátit úpravy
Syllabus
  • 1. Introduction to cyber crime, basic criminology. 2. Forensic, forensic and legal aspects of computer crime. 3. Typical forensic clues useful in the investigation of computer crime, the nature of digital tracks. 4. The identification exploration in the investigation of computer crime. 5. Methods and methodological methods in the investigation of computer crime. 6. Rating criminal dimension of cyber crime. 7. Methods of ensuring the exploration and use of forensic traces in the investigation of computer crime. 8. Determination of typical versions, investigative situation. 9. crime scene investigation of computer crime. 10. Hearing in the investigation of computer crime. 11. Recognition in the and investigative attempt to investigate computer crime. 12th prevention of cyber crime investigation.
Literature
    required literature
  • KONRÁD Zdeněk, PORADA Viktor, STRAUS Jiří, SUCHÁNEK Jaroslav. Kriminalistika - Teorie, metodologie a metody kriminalistické techniky. Plzeň: Vydavatelství a nakladatelství Aleš Čeněk, 2008, 520 s., ISBN 978-80-7380-124-3.
  • PORADA Viktor, STRAUS Jiří, Kriminalistické stopy - Teorie, metodologie, praxe. Plzeň: Aleš Čeněk, 2012, ISBN 978-80-7380-396-4
    recommended literature
  • PORADA, Viktor a kolektiv. : Kriminalistika (teorie, metody, metodologie). Plzeň Aleš Čeněk, 2013. ISBN 978-80-7380-490-9.
  • PORADA Viktor, STRAUS Jiří a kolektiv: Kriminalistika (výzkum, pokroky, perspektivy). Plzeň Aleš Čeněk, 2014. ISBN 978-80-7380-477-0
Teaching methods
Theoretical training, lectures, seminar exercises, seminar work.
Assessment methods
The course is completed with verbal exam. Answer one of the 15 topic questions correctly is required to pass the exam.
Language of instruction
Czech
Further comments (probably available only in Czech)
The course can also be completed outside the examination period.
General note: ISP.
Information on the extent and intensity of the course: 6 hodin KS/semestr.
The course is also listed under the following terms Summer 2015, Winter 2016, Winter 2017, Winter 2018, Winter 2019, Winter 2020.
  • Enrolment Statistics (Summer 2016, recent)
  • Permalink: https://is.vsfs.cz/course/vsfs/summer2016/N_POKR