Topic:

Cyber subversion

Lecturer:

Jakub Fučík, Ph.D.

Introduction to the topic:

The development of communication and information technologies (ICT) not only leads to the possibility of new services that change the way of life and facilitate the exchange of information, but also the growing dependence of society on these technologies. The security vulnerabilities is mainly posed by the use of ICT in systems providing critical state infrastructure (energy, telecommunications services, supply).

Cyberspace allows, on the one hand, the transmission and sharing of information, on the other hand, it is a place where information leaks occur (computer crime, espionage). The activities of state or non-state actors are accompanied by contemporary conflicts both by attacking state infrastructure and by direct attacks on defense systems.

The issue of cyber security is reflected in the strategic documents of states and institutions. The nature of current conflicts shows that the cyber dimension will accompany future conflicts. The question is to what extent and whether it will be dominant.

Instructions for the seminar will be added one week before the seminar at the latest

Required sources:

FUČÍK, Jakub. Cyber subversion (presentation)

ANDRESS, Jason a Steve WINTERFIELD. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. 2. ed. Waltham: Syngress, 2014 (pages 1-34). Available here

Additional sources:

LEWIS, James A. The Role of Offensive Cyber Operations in NATO’s Collective Defence. 2015. Available from: https://ccdcoe.org/uploads/2018/10/TP_08_2015_0.pdf

Sources for your leisure time:

GIBSON, William: Neuromancer (book, 1984)

Naposledy změněno: středa, 10. května 2023, 09.54