main studijos image
main studijos image

Introduction to Cyber Security

Description

This course demonstrates the main current information security challenges, focusing on three core aspects: 1) cyber security and information theft, 2) challenges to security broadly conceived in today’s society that is based on computer code; 3) fake news and deception tactics. Throughout the course, students will be introduced to the most important societal, cognitive, and informational changes that have led to the advent of cyber and information security as one of the key political and national security threats as well as the similarities and differences between information security threats arising in today’s technology-saturated environment, potential action repertoires of threat actors, and protection strategies.

Aim of the course

To introduce students to the latest trends in communication and information security, necessary for successful professional and civic activities in the contemporary information environment.

Prerequisites

Globalization and International Communication; Risk and Sustainable Development Communication

Course content

Introduction. Course structure, content and requirements The experience age and post-truth Fake news and their application Media and their logics. Mediatisation Digital innovations and challenges Ethical aspects of changes in communication Cultural changes and challenges Challenges in protectiing the public sphere Cyber security crisis communication Cybercrime: antecedents and threats Cybercrime: means and actors Cyber warfare: actors and threats Algorithmisation and challenges of governance Data, privacy and other challenges

Assesment Criteria

1. Students are able to identify and foresee cultura, social, political and economic changes, related to the cyberspace and the ecosystems of its security and insecurity 2. Students are able to foresee and respond to cyber and communication security challenges and to creatively make use of the benefits offered by cyberspace 3. Students are able to understand and apply communication security practices 4. Students are able to identify challenges and to prapare a suitable response 5. Students are able to understand the moral and legal aspects of information use