Skip to top bar
Skip to header
Skip to content
Skip to footer
CS
>
Cybersecurity Law
Interactive Syllabus
Cybersecurity Law
CONTENTS
Cybersecurity Law
Study now
Course Requirements
Study now
23.2. Cybersecurity and Cyber-defence law - system and principles (POLČÁK)
Study now
2.3. International cybersecurity law (HARAŠTA)
Study now
9.3. Incidents and cyber-operations - case studies (BÁTRLA)
Study now
16.3 Assignment of scenarios (HARAŠTA)
Study now
23.3. European Cybersecurity Law I - NIS Directive (POLČÁK)
Study now
30.3. European Cybersecurity Law II - Cybersecurity Act (POLČÁK)
Study now
6.4. Institutional backing of cybersecurity in Europe (POLČÁK)
Study now
13.4. Liability for cybersecurity incidents (POLČÁK)
Study now
20.4. Securing critical infrastructures (HARAŠTA)
Study now
27.4. Securing autonomous systems (ŽOLNERČÍKOVÁ)
Study now
4.5. Securing clouds (KLODWIG)
Study now
11.5. Simulations and trainings (KYPO field trip) (STUPKA)
Study now
18.5. Scenario defence (HARAŠTA)
View all
20.4. Securing critical infrastructures (HARAŠTA)
Securing Critical Infrastructure
Supplementary literature (read after seminar)
S. Rinaldi, J. Peerenboom and T. Kelly, Identifying, understanding and analyzing critical infrastructure interdependencies, IEEE Control Systems vol. 216, pp. 11–25, 2001.
C. Pursiainen, The challenges for European critical infrastructure protection, Journal of European Integration, vol. 316, pp. 721–739, 2009.
Previous
Next
Cybersecurity Law
Study now
Course Requirements
Study now
23.2. Cybersecurity and Cyber-defence law - system and principles (POLČÁK)
Study now
2.3. International cybersecurity law (HARAŠTA)
Study now
9.3. Incidents and cyber-operations - case studies (BÁTRLA)
Study now
16.3 Assignment of scenarios (HARAŠTA)
Study now
23.3. European Cybersecurity Law I - NIS Directive (POLČÁK)
Study now
30.3. European Cybersecurity Law II - Cybersecurity Act (POLČÁK)
Study now
6.4. Institutional backing of cybersecurity in Europe (POLČÁK)
Study now
13.4. Liability for cybersecurity incidents (POLČÁK)
Study now
20.4. Securing critical infrastructures (HARAŠTA)
Study now
27.4. Securing autonomous systems (ŽOLNERČÍKOVÁ)
Study now
4.5. Securing clouds (KLODWIG)
Study now
11.5. Simulations and trainings (KYPO field trip) (STUPKA)
Study now
18.5. Scenario defence (HARAŠTA)
Operations
View all