Checking date: 16/05/2025 09:59:44


Course: 2025/2026

Cyber crime, cyber terrorism and cyber war
(12395)
Master in Cybersecurity (Plan: 325 - Estudio: 288)
EPI


Coordinating teacher: MIGUEL ALVAREZ, JOSE LUIS DE

Department assigned to the subject: Computer Science and Engineering Department

Type: Electives
ECTS Credits: 3.0 ECTS

Course:
Semester:




Requirements (Subjects that are assumed to be known)
None
Objectives
The main goal of the course is to provide students who approach cybersecurity with little-to-none previous background with a socio-techno-economic perspective of current security and privacy phenomena in the Internet, how we got here, and what might be done about it. Specifically, the course provides a historical perspective on the development of the cybersecurity discipline and an overview of the main themes in the following topics: opponents and the current cyberthreat landscape; the underground economy of cybercrime; vulnerabilities, exploits and their markets; privacy and surveillance --including commercial surveillance--, and state-sponsored cyberoperations. LEARNING OUTCOMES This course contributes to the following learning outcomes: Explain other attack techniques to a system that is not vulnerable to direct intrusion Knowing the type of information and defense mechanisms deployed in a system, explain the impact of different threats and intrusions and, in particular, information leaks.
Learning Outcomes
Description of contents: programme
1. Introduction, Definitions, and Basic Concepts 1.1. Origins 1.2. Cyberattacks galore 1.3. A brief history of malware 1.4. Welcome to the underground economy 1.5. The cyberthreat landscape 1.6. Trends 2. Cyberattacks and Cyberactivism 2.1. Types of cyber attacks 2.2. Cybercrime 2.3. Cyberespionage 2.4. Analysis of Practical Cases 2.5. Legal Aspects 3. Cyberterrorism and Cyberoperations against Critical Infrastructures 3.1. Critical Infrastructures: Interconnections and Vulnerabilities 3.2. Industrial Control Systems 3.3. Other Critical Infrastructures 3.4. Analysis of Practical Cases 4. Cyberwar 4.1. Cyberweapons: Logic, Physical, and Psychological Instruments 4.2. Cyberdoctrine 4.3. Analysis of Practical Cases
Learning activities and methodology
LEARNING ACTIVITIES: - Lectures and practicals - Tutorship - Group work - Individual work METHODOLOGIES - Lectures to introduce and discuss the main course concepts. - Study and analysis of references provided by the lecturer, including academic papers, reports, selected book chapters, and press articles. This will be instrumental to consolidate and complement concepts introduced in the course, and also as material to be discussed during some lectures. - Analysis of practical cases proposed by the lecturer, either individually or in group. - Presentation and discussion of topics and practical cases related to the course. - Preparation of individual essays and reports. - Resolution of exercises and questions in tests.
Assessment System
  • % end-of-term-examination/test 0
  • % of continuous assessment (assigments, laboratory, practicals...) 100

Calendar of Continuous assessment


Basic Bibliography
  • Bill Blunden, Violet Cheung. Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex. Trine Day. 2014
  • Brian Krebs. Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door. Sourcebooks. 2014
  • Bruce Schneier. Secrets and Lies: Digital Security in a Networked World. Wiley. 2004
  • Christopher Hadnagy, Paul Wilson. Social Engineering: The Art of Human Hacking. Wiley. 2010
  • Christopher Paul. Information Operations - Doctrine and Practice: A Reference Handbook. Praeger. 2008
  • Cliff Stoll. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books. 2005
  • Cristopher Hadnagy, Paul F. Kelly, Paul Ekman. Unmasking the Social Engineer: The Human Element of Security. Wiley. 2014
  • Dennis F. Poindexter. The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests. McFarland. 2013
  • Derek S. Reveron. Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World. Georgetown University Press. 2012
  • Edwin L. Armistead. Information Operations: Warfare and the Hard Reality of Soft Power. Potomac Books Inc.. 2004
  • Ian Mann. Hacking the Human. Gower. 2008
  • Ian Mann. Hacking the Human 2. Consilience Media. 2013
  • J. D. Lasica. Darknet: Hollywood's War Against the Digital Generation. Wiley. 2005
  • Jason Andress, Steve Winterfeld. Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners. Syngress. 2013
  • Jeffrey Carr. Inside Cyber Warfare: Mapping the Cyber Underworld (2nd Edition). O'Reilly Media. 2011
  • Jonathan Clough. Principles of Cybercrime. Cambridge University Press. 2010
  • Julie E. Mehan. Cyberwar, Cyberterror, Cybercrime and Cyberactivism (2nd Edition). ITGP. 2014
  • Kevin D. Mitnick, William L. Simon. The Art of Deception: Controlling the Human Element of Security. Wiley. 2003
  • Kevin D. Mitnick, William L. Simon. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. Wiley. 2005
  • Kevin Hogan, James Speakman. Covert Persuasion: Psychological Tactics and Tricks to Win the Game. Wiley. 2006
  • Kevin Mitnick, William L. Simon. Ghost in the Wires: My Adventures as the World's Most Wanted Hacker. Back Bay Books. 2012
  • Kevin Poulsen. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground. Broadway Books. 2012
  • Majid Yar. Cybercrime and Society, 2nd Edition. SAGE Publications Ltd.. 2013
  • Mark Bowden. Worm: The First Digital World War. Grove Press. 2012
  • Martin C. Libicki. Cyberdeterrence and Cyberwar. RAND Corporation. 2009
  • Nicholas Capaldi. The Art of Deception: An Introduction to Critical Thinking. Prometheus Books. 2007
  • P.W. Singer, Allan Friedman. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press. 2014
  • Parmy Olson. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. Back Bay Books. 2013
  • Patrick D. Allen. Information Operations Planning. Artech House Publishers. 2007
  • Phil Lapsley. Exploding the Phone. Grove Press. 2014
  • Richard A. Clarke, Robert Knake. Cyber War: The Next Threat to National Security and What to Do About It. Ecco. 2012
  • Robert Moore. Cybercrime, Second Edition: Investigating High-Technology Computer Crime. Anderson. 2006
  • Ronald J. Deibert. Black Code: Surveillance, Privacy, and the Dark Side of the Internet. Signal. 2013
  • Thomad Rid. Cyber War Will Not Take Place. Oxford University Press. 2013

The course syllabus may change due academic events or other reasons.