{"id":2236,"date":"2009-11-10T12:46:41","date_gmt":"2009-11-10T10:46:41","guid":{"rendered":"http:\/\/dev.ds.unipi.gr\/temsec2\/en\/?p=2236"},"modified":"2024-04-23T21:58:30","modified_gmt":"2024-04-23T19:58:30","slug":"cybercrime-cybersecurity-and-digital-forensics","status":"publish","type":"post","link":"https:\/\/masters.ds.unipi.gr\/MSc_Law_ICT\/en\/cybercrime-cybersecurity-and-digital-forensics\/","title":{"rendered":"Cybercrime, Cybersecurity and Digital Forensics"},"content":{"rendered":"<h3>Learning Outcomes<\/h3>\n<p>Within the framework of the course, students will be able to:<\/p>\n<ul>\n<li>Demonstrate a critical understanding of the relationships between law and digital technologies.<\/li>\n<li>Understand contemporary legal issues arising from the widespread use of information and communication technologies.<\/li>\n<li>Possess significant knowledge of modern attacks on information systems and cybercrimes.<\/li>\n<li>Have the ability to critically analyze modern regulatory approaches to addressing cybercrimes.<\/li>\n<li>Understand the various dimensions of economic cybercrimes.<\/li>\n<li>Possess advanced knowledge of the evolving landscape of digital criminology and regulations regarding e-evidence.<\/li>\n<li>Understand the legal, socio-legal, and geopolitical dimensions of cybersecurity.<\/li>\n<li>Possess state-of-the-art specialized scientific knowledge in the subjects of the course as a basis for original thinking and research activities.<\/li>\n<\/ul>\n<p><\/p>\n<h3>Syllabus<\/h3>\n<ul>\n<li>Introduction to the concept of Cybercrime, Cybersecurity, and Digital Forensics &#8211; Introduction to basic concepts.<\/li>\n<li>International Environment and Framework: Convention on Cybercrime, Union Framework (NIS Directives 1\/2, Cybersecurity Act, etc.) &#8211; Overview of the Greek regulatory framework governing cybercrime\/electronic crime.<\/li>\n<li>Unauthorized access to information systems\/attacks on information systems (e.g., disruption of operation): Legal framework &#8211; Forms of attacks (Legal dimension, reference to attack forms).<\/li>\n<li>Unauthorized access to data\/data tampering (Legal dimension, reference to attack forms).<\/li>\n<li>Crimes against privacy\/freedom of communications and security (electronic) communications (Legal dimension, reference to attack forms).<\/li>\n<li>Economic Cybercrime: Digital fraud\/computer fraud. Social engineering as a method of fraud.<\/li>\n<li>Economic Cybercrime: Cryptocurrencies and criminal law.<\/li>\n<li>Unfair and illegal content on the Internet (child pornography\/hate speech, etc.) &#8211; Issues regarding the detection of unfair and illegal content on the Internet.<\/li>\n<li>Cybercrime: Jurisdiction, Judicial cooperation &#8211; Place of the crime. Concept and regulation of e-evidence.<\/li>\n<li>Digital Forensic Investigation: Preconditions &#8211; Technical\/legal &#8211; Procedural requirements, methodology issues, applications, and tools.<\/li>\n<li>Digital Forensic Investigation: Visit to\/lectures from Cybercrime Prosecution Officials, Directorate of Cybercrime Investigations.<\/li>\n<li>Concepts and legal dimension\/legal-political\/geopolitical dimension of Cybersecurity. Evolution and Policies for Cybersecurity.<\/li>\n<li>Regulatory framework and implementation issues (NIS Directive 2\/Cybersecurity Act) &#8211; Implementation bodies &#8211; Implementation issues.<\/li>\n<\/ul>\n<p><!--more--><\/p>\n<ul>\n<li>Iglezakis I (ed.), Jougleux Ph., Mitrou L., Synodinou T., \u201cThe Legal Regulation of Cyber Attacks\u201d, Kluwer 2020<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Learning Outcomes Within the framework of the course, students will be able to: Demonstrate a critical understanding of the relationships between law and digital technologies. Understand contemporary legal issues arising from the widespread use of information and communication technologies. Possess significant knowledge of modern attacks on information systems and cybercrimes. Have the ability to critically [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[5,36],"tags":[],"_links":{"self":[{"href":"https:\/\/masters.ds.unipi.gr\/MSc_Law_ICT\/en\/wp-json\/wp\/v2\/posts\/2236"}],"collection":[{"href":"https:\/\/masters.ds.unipi.gr\/MSc_Law_ICT\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/masters.ds.unipi.gr\/MSc_Law_ICT\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/masters.ds.unipi.gr\/MSc_Law_ICT\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/masters.ds.unipi.gr\/MSc_Law_ICT\/en\/wp-json\/wp\/v2\/comments?post=2236"}],"version-history":[{"count":15,"href":"https:\/\/masters.ds.unipi.gr\/MSc_Law_ICT\/en\/wp-json\/wp\/v2\/posts\/2236\/revisions"}],"predecessor-version":[{"id":2730,"href":"https:\/\/masters.ds.unipi.gr\/MSc_Law_ICT\/en\/wp-json\/wp\/v2\/posts\/2236\/revisions\/2730"}],"wp:attachment":[{"href":"https:\/\/masters.ds.unipi.gr\/MSc_Law_ICT\/en\/wp-json\/wp\/v2\/media?parent=2236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/masters.ds.unipi.gr\/MSc_Law_ICT\/en\/wp-json\/wp\/v2\/categories?post=2236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/masters.ds.unipi.gr\/MSc_Law_ICT\/en\/wp-json\/wp\/v2\/tags?post=2236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}