-
Presentation
Presentation
This curricular unit aims to provide knowledge and skills in the fields of cybersecurity and privacy, as well as to promote critical analysis and impact assessment for the use of advanced technologies and big data.
-
Class from course
Class from course
-
Degree | Semesters | ECTS
Degree | Semesters | ECTS
Master Degree | Semestral | 6
-
Year | Nature | Language
Year | Nature | Language
1 | Mandatory | Português
-
Code
Code
ULHT6347-23272
-
Prerequisites and corequisites
Prerequisites and corequisites
Not applicable
-
Professional Internship
Professional Internship
Não
-
Syllabus
Syllabus
- Cyberspace and Cyberspaces (CP1)
- Genesis, onthology and teleology.
- Technical, social and cultural space.
- Data and cyberspace Geopolitics.
- Cybersecurity and Threat landscape (CP2)
- Risks and conflicts
- Hackers and other digial world outlaws
- Hacktivism, Organised Cybercrime, Cyberespionage, Cyberwar
- Counter-Cyberconflicts (CP3)
- Resilience and simple protection
- Tackle cybecrime
- Cyberdiplomacy
- Cyberwar
- Intelligence
- Privacy and data protection (CP4)
- Internet of things
- Social Networks
- Werables
- Protection of cybespace (CP5)
- Best practices
- Norms
- Regulation
- Cybercrime legal framework (CP6)
- Cybercrime law
- Budapest Convention
- Future tecnologies (CP7)
- 5G networks
- Artificial Inteligence
- Crypto Assets
- Blockchain
- Cyberspace and Cyberspaces (CP1)
-
Objectives
Objectives
OA1 - Knowledge on the national framework for the security of cyberspace;
OA2 - Knowledge on the multiple classes of cyberattaks;
OA3 - Knowledge on cyber threats and vulnerabilities;
OA4 - knowledge on legislation, regulation and best practices towards data protection and privacy;
OA5 - Knowledge on methods to perform Data Protection Impact Assessment;
OA6 - Knowledge on laws, regulations, policies and ethics applied to cybersecurity and privacy;
-
Teaching methodologies and assessment
Teaching methodologies and assessment
The teaching methodologies employed in this curricular unit are:
ME1: Expositional
ME2: Case Study
-
References
References
- Morozov, Evgeny. (2011). The Net Delusion: How Not to Liberate the World.
- Shirky, Clay. (2008). Here comes everybody : the power of organizing without organizations. New York : Penguin Press
- Zuboff, S. (2019). The age of surveillance capitalism. Profile Books.
- O’Neil, C. (2017). Weapons of math destruction. Penguin Books.
- Verbeek, Peter-Paul. (2011). Moralizing Technology: Understanding and Designing the Morality of Things.
- CNCS (2021). Relatório Sociedade. Disponível em https://www.cncs.gov.pt/docs/relatorio-sociedade2021-observ-cncs.pdf
- CNCS (2021). Relatório Riscos e Conflitos. Disponível em https://www.cncs.gov.pt/docs/relatorio-riscosconflitos2021-observatoriociberseguranca-cncs.pdf
-
Office Hours
Office Hours
Nome do docente
Horário de atendimento
Sala
-
Mobility
Mobility
No