Wednesday, January 22, 2025
-8.8 C
New York

Strategic Cybersecurity

Future Considerations

Strategic Cybersecurity, Module 15: Future Considerations. This final lecture of the course “Strategic Cybersecurity” discusses topics for students to consider in the future. The module...

Critical Infrastructure

Strategic Cybersecurity, Module 14: Critical Infrastructure. The U.S. government’s approach to protecting critical infrastructure from physical and cyber attacks has evolved over the past half-century,...
spot_imgspot_img

Economics, Government Regulation, and Cybersecurity

Strategic Cybersecurity, Module 13: Economics, Government Regulation, and Cybersecurity. Cybersecurity may be considered both a public and a private good,...

Privacy

Strategic Cybersecurity, Module 12: Privacy. This lecture discusses privacy concerns on the Internet. The module clarifies that concerns exist not...

Dataveillance

Strategic Cybersecurity, Module 11: The Concept of Dataveillance. This lecture discusses the concept of combining big data analysis with technical...

Cyber Crime and the Law

Strategic Cybersecurity, Module 10: Cyber Crime and the Law. This lecture expands on the difficulty in determining computer intrusion...

Problems of Identity and Attribution

Strategic Cybersecurity, Module 9: Problems of Identity and Attribution. This lecture discusses the problem of determining identity and attribution on...

Cyber Conflict and the Law

Strategic Cybersecurity, Module 8: Cyber Conflict and the Law. Lecture 8 discusses problems that cyber technology poses for international law....