Cyberspace and combating cybercrime

Type: Normative

Department: department of digital economics and business analytics




SemesterAmount of hoursLecturerGroup(s)
118Yarema O. R.УФЕМ-61с

Laboratory works

SemesterAmount of hoursGroupTeacher(s)
1116УФЕМ-61сYarema O. R., Yarema O. R.

Course description

The discipline “Cyberspace and combating cybercrime” is an important component of modern education, since cyberspace has become an integral part of our everyday life, and virtual threats have become serious problems for society.

The relevance of the discipline “Cyberspace and combating cybercrime” in the modern world is extremely high with numerous well-founded reasons:

Growth of cybercrime: Cybercrime such as hacking attacks, phishing, cyber theft and others are becoming more common and sophisticated. This causes significant losses to both the economy and individual users.
Increasing importance of information: In today’s world, information has a great value. Cyber criminals are interested in confidential data, business secrets, financial information and other important resources. Protecting this data becomes an extremely important task.
State and global security challenges: Cybercrime can be used to attack state interests, including election systems, critical infrastructure, and defense systems. Protecting national and global security requires qualified experts in the field of cyber security.
Demand for Cyber Security Professionals: A growing number of companies and government organizations are focusing on cyber security and are constantly looking for highly skilled professionals who can protect their information resources from attacks.
Wide range of threats: Threats in cyberspace are constantly changing and evolving, including new types of attacks and attacks targeting different industries and sectors. The perspective of understanding and combating these threats is important for today’s information security professionals.
Legislative and regulatory requirements: Many countries are implementing laws and regulations that require organizations to pay more attention to cybersecurity. Understanding these requirements and meeting them are important aspects for many organizations.
Technological developments: The rapid development of information technology creates new opportunities for cybercriminals. Cyber security professionals need to stay up-to-date with the latest technologies and attack methods to counter effectively.

Considering these factors, the discipline “Cyberspace and countering cybercrime” becomes critical for training qualified professionals who can protect information, infrastructure and security in the digital world.

The subject of the academic discipline

This discipline aims to study and understand cyberspace and cybercrime. The main aspects of this discipline include:

The study of the structure and functioning of cyberspace, including networks, the Internet, computing systems, and other components of the digital environment.
Analysis of different types of cybercrime such as hacking, phishing, viruses, network attacks and others and their impact on organizations and individuals.
Study of methods and means of protecting information and infrastructure from cyber attacks, including the use of encryption, firewalls, antivirus programs and other technical means.
Consideration of legislative and regulatory aspects relating to cyber security and cybercrime, including legal standards and norms of behavior in the digital environment.
Understanding ethical issues related to the use of cyberspace and maintaining ethical standards in the digital world.
Studying methods and tools for protecting personal data and preserving privacy on the Internet.
Analysis of issues related to cyber security at the national and international levels, including aspects of cyber warfare and cyber diplomacy.

The discipline “Cyberspace and combating cybercrime” is important in today’s world, where information technologies are of great importance, and threats in cyberspace are constantly growing. Professionals who have knowledge in this field have an important contribution to ensure the security of information and infrastructure.

The purpose of the educational discipline

The purpose of the discipline “Cyberspace and countering cybercrime” is to provide students with a deep understanding of cyberspace and cybercrime, as well as to develop the skills and competencies necessary to effectively protect information, infrastructure and security in the digital environment.

Requirements for knowledge and skills

The study of the academic discipline “Cyberspace and combating cybercrime” involves the achievement of such a qualification level of master’s training, for which he must obtain:

a) knowledge

Computer Science Fundamentals: Students should have a basic understanding of computer systems, operating systems, networks, programming, and other aspects of computer science.
Cybersecurity Fundamentals: Understanding of key cybersecurity terms and concepts such as authentication, authorization, encryption, threats, incidents, and more.
Basics of networks and the Internet: Understanding the architecture of networks, principles of operation of the Internet and basic network protocols.
Legal and Regulatory Basics: Understanding the main legal and regulatory aspects related to cyber security and cyber crime.

b) ability:

Information security: Ability to develop and implement measures to protect information from unauthorized access, data leakage and other threats.
Cybercrime detection and response: The ability to identify potential cyberattacks, analyze them, and take measures to respond to incidents.
Ethical behavior in cyberspace: Compliance with ethical norms and standards for the use of cyberspace, including those related to information protection and security.
Communication Skills: The ability to communicate effectively with other professionals, both in the field of cyber security and in organizations and the public.
Understanding of legislation and regulation: Ability to determine compliance of actions and practices with legislation and regulatory requirements in the field of cyber security.

Requirements can be very specific and may include knowledge of specific cybersecurity software, skills in cyber threat analysis, ability to develop cyber defense plans, and more. It is important that students are prepared to learn the complex technical and legal aspects of cyber security and cyber crime.

The place of the educational discipline in the structural and logical scheme

The educational discipline is interconnected with such disciplines as “Information and communication technologies”, “Information systems in management”, “Computer networks”, “Digital economy”, “IT law”

Name and description of competences, the formation of which ensures the study of the discipline.

When studying the discipline “Cyberspace and combating cybercrime”, students of higher education acquire the following competences (ability):

IC1 – The ability to solve complex specialized tasks and practical problems in the economic sphere, which are characterized by the complexity and uncertainty of conditions, which involves the application of theories and methods of economic science.

ZK3 – Ability to abstract thinking, analysis and synthesis.

ZK5 − Ability to communicate in the state language both orally and in writing.

ZK8 – Ability to search, process and analyze information from various sources.

ZK9 – Ability to adapt and act in a new situation.

ZK10 – Ability to be critical and self-critical.

SK13 – Ability to conduct an economic analysis of the functioning and development of business entities, assessment of their competitiveness.

SK14 – Ability to analyze problems and phenomena in one or more professional fields in depth, taking into account economic risks and possible socio-economic consequences.

SK17 – Ability to manage and use modern information and communication systems and technologies.

Program learning outcomes:

PR05 – Apply analytical and methodical tools for justifying proposals and making management decisions by various economic agents (individuals, households, enterprises and state authorities).

PR06 – Use professional argumentation to convey information, ideas, problems and ways to solve them to specialists and non-specialists in the field of economic activity.

PR10 – Conduct an analysis of the functioning and development of business entities, determine functional areas, calculate the relevant indicators characterizing the effectiveness of their activities.

PR13 – Identify sources and understand the methodology of determining and methods of obtaining socio-economic data, collect and analyze the necessary information, calculate economic and social indicators.

PR25 − Understand the structure, basic principles of activity and business processes of subjects of the IT industry.

Recommended Literature

  1. Alvarez R, Still J. Cybersecurity for Beginners. – Kharkiv: Smith Publishing House, 2020. – 240 p.
  2. Brown, K. Cyber Threats: Technology and Defense. – Lviv: World of Books, 2017. – 240 p.
  3. Vlasko S. Protection of personal data: whose experience can be useful to Ukraine. European truth. URL: rus/experts/ 2018/01/16/ 7076152/.
  4. Halak M. Cybercrimes: Methods, subjects and requirements for proof. – K.: Yurinkom Inter Publishing House, 2018. – 224 p.
  5. Gibson, D. Cyber Security and Defense Against Cyber Threats. – Lviv: Spadok Publishing House, 2020. – 296 p.
  6. Elushchenko N. What is the Internet of Things? Even your grandmother will understand this. 2018. URL: .
  7. European Union, Official Text of the GDPR Regulation. European Data Protection Board
  8. Carter, J. Cybersecurity in the Enterprise Environment. – Kharkiv: InfoPros Publishing House, 2019. – 320 p.
  9. Keyser E. W. Cybercrime and the Law: A Guide for Lawyers. – K.: Yurinkom Inter, 2019. – 192 p.
  10. Kennedy, D., O’Gorman, D., and Vinny, D. “Metasploit: The Penetration Tester’s Guide.”
  11. Code of Ukraine on Administrative Offenses (Articles 1 – 212-24): Law of December 7 1984 No. 8073-Х. Information of the Verkhovna Rada of the Ukrainian SSR. Appendix to No. 51. Art. 1122.
  12. The Constitution of Ukraine dated June 28 1996 No. 254k/96-VR. Information of the Verkhovna Rada of Ukraine. No. 30. Art. 141.
  13. The Criminal Code of Ukraine dated April 5 2001 No. 2341-111. Information of the Verkhovna Rada of Ukraine. No. 25-26. Art. 131.
  14. Landini, M. Information Security: Protecting Data and Systems. – Dnipro: Prestige Publishing House, 2018. – 224 p.
  15. McDonald G. Cybercrime: A textbook for students. – Lviv: Publishing House of Lviv Polytechnic, 2017. – 312 p.
  16. Marich, A., and others. “GDPR: Personal Data Protection Regulation.”
  17. Mitnick, K., and Simons, W. “The Art of Deception: Controlling the Human Element of Security.”
  18. Murray, J., Bowling, C. Cybersecurity and Cybercrime: Theory and Practice. – K.: InfoDim Publishing House, 2022. – 368 p.
  19. Newman M. History of cybercrime: From computer viruses to cyberwars. – K.: “Naukova Dumka” Publishing House, 2019. – 368 p.
  20. Prygula P. 5 problems of the Internet of Things to be solved. 2016. URL: problem_ intemeta_veshchej_kotorye_ predstoit_ reshit.
  21. On the protection of personal data: the Law of Ukraine dated June 1 2010 No. 2297-VI. Information of the Verkhovna Rada of Ukraine. No. 34. Art. 481.
  22. Simson G., Stallings V. Basics of computer security. – Kharkiv: Osnova, 2019. – 384 p.
  23. Simson, G., Hacker, E. Cyber Defense: Tools and Techniques. – K.: Technika Publishing House, 2021. – 448 p.
  24. Smith P. Information security and data protection. – Dnipro: Dialectics, 2021. – 312 p.
  25. Stallings VA Cybersecurity: Introduction to information security. – K.: “Elga” Educational Center, 2018. – 432 p.
  26. Internet of Things technology: automation of the present thanks to future developments. IT rating UA. URL: tehnologiya-intemet-veschey-avtomatizatsiya-nastoyaschego-blagodarya- razrabotkam-buduschego.
  27. Hedney, K., and Williams, P. “Social Engineering: The Art of Human Hacking.”
  28. Khilko V. I. Cyber protection: Theory and practice. – K.: Logos Publishing House, 2020. – 288 p.
  29. Hollins, T. J. Cybercrime and Cybersecurity: Fundamentals, Challenges, and Solutions. – Dnipro: Liga-Press Publishing House, 2021. – 416 p.
  30. Center for Army, Conversion and Disarmament Studies. Artificial intelligence on the guard of data security: innovative technologies and cloud services help to ensure cyber security [Electronic resource] Access mode:
  31. A Practical Evaluation of Information Processing and Abstraction Techniques for the Internet of Things / Frieder, D. Puschmann, P. Barnaghi, F. Carrez. IEEE Internet of Things Journal. 2015. No. 2. C. 340-354. 10.1109/doi.2015.2411227
  32. A Strategic Compass for Security and Defence, EEAS, March 2022.
  33. Activation of first capability developed under PESCO points to strength of cooperation in cyber defense, EDA, February 2022.
  34. Antoniuk, D., DDoS attacks hit Ukrainian government websites, The Record, February 2022.
  35. Attribution to Russia of malicious cyber activity against Ukraine, Australian government, February 2022.
  36. Brumfield, C., Russia-linked cyber-attacks on Ukraine: A timeline, CSO, April 2022.
  37. Cerulus, L., How Ukraine became a test bed for cyberweaponry, Politico, February 2019.
  38. Cerulus, L., Ukraine is getting pummeled with cyber-attacks. What’s the West to do?, Politico, February 2022.
  39. Cimpanu, C., Hackers deface Ukrainian government websites, The Record, January 2022.
  40. Cimpanu, C., Ukraine reports cyber-attack on government document management system, Zdnet, February 2021.
  41. Clayton, M., Russia Hammers Ukraine With Massive Cyber-Attack, Business Insider, March 2014.
  42. Corewin: modern cyber security trends. [Electronic resource] Access mode:
  43. Datami: protecting your business on the Internet. Security and cyber security of smartphones. [Electronic resource] Access mode:
  44. Deputy Secretary General stresses NATO will continue to increase Ukraine’s cyber defenses, NATO, January 2022.
  45. The EU imposes the first ever sanctions against cyber-attacks, Council of the European Union, July 2020.
  46. Fendorf, K. and Miller, J., Tracking Cyber Operations and Actors in the Russia-Ukraine War, Council on Foreign Relations, March 2022.
  47. Freedom House, “Freedom on the Net” Reports. Global Internet Freedom Consortium.
  48. Harding, L., Ukraine hit by ‘massive’ cyber-attack on government websites, The Guardian, January 2022.
  49. Hern, A., Ukrainian blackout caused by hackers that attacked media company, researchers say, The Guardian, January 2016.
  50. Holland, Steve. and Pearson J., US, UK: Russia responsible for cyber-attack against Ukrainian banks, Reuters, February 2022.
  51. Hybrid CoE continues to work to support European security and Ukraine, Hybrid CoE, March 2022.
  52. Internet of Things (IoT). European Union Agency for Cybersecurity. 2018. URF: .
  53. Ishak, N., Is Russia holding back from cyberwar?, Vox, March 2022.
  54. Kagubare, I., US, EU cyber investments in Ukraine pay off amid war, The Hill, March 2022.
  55. Legal service: Cyber security of business during war [Electronic resource]. Access mode:
  56. Madiega, T., Russia’s war on Ukraine: The digital dimension, EPRS, March 2022.

Internet resources:

1.CyberScoop: Cybersecurity News and Analytics. [Electronic resource]. Access mode:

2.Krebs on Security: Blog by Brian Krebs, a well-known cybersecurity journalist. [Electronic resource]. Access mode:

3.Threatpost: Cybersecurity news and analytics, including the latest threats and vulnerabilities. [Electronic resource]. Access mode:

4.Dark Reading: A resource dedicated to news and analytics in the field of information security. [Electronic resource]. Access mode:

5.SANS Institute: An organization that offers cybersecurity training and resources, including a blog and webinars. [Electronic resource]. Access mode:

6.The Hacker News: News about cyber security and information technology. [Electronic resource]. Access mode:

7.Cybersecurity and Infrastructure Security Agency (CISA): The official website of the US agency CISA with information and recommendations on cyber security. [Electronic resource]. Access mode:

8.OWASP (Open Web Application Security Project): A resource dedicated to web applications and their security, with many useful articles and projects. [Electronic resource]. Access mode:

9.Cybersecurity and Technology News – Reddit: A community on Reddit that discusses cybersecurity news and topics. [Electronic resource]. Access mode: )

10.Cybersecurity Podcasts: There are many interesting podcasts about cybersecurity, such as “Security Now,” “Darknet Diaries,” “CyberWire,” and others.



Working program of discipline


Download curriculum


Завантажити силабус