Saturday, February 1, 2025
2.1 C
New York

Tag: course

Future Considerations

Strategic Cybersecurity, Module 15: Future Considerations. This final lecture of the course “Strategic Cybersecurity” discusses topics for students to consider...

Critical Infrastructure

Strategic Cybersecurity, Module 14: Critical Infrastructure. The U.S. government’s approach to protecting critical infrastructure from physical and cyber attacks has...

Economics, Government Regulation, and Cybersecurity

Strategic Cybersecurity, Module 13: Economics, Government Regulation, and Cybersecurity. Cybersecurity may be considered both a public and a private good,...

Privacy

Strategic Cybersecurity, Module 12: Privacy. This lecture discusses privacy concerns on the Internet. The module clarifies that concerns exist not...

Dataveillance

Strategic Cybersecurity, Module 11: The Concept of Dataveillance. This lecture discusses the concept of combining big data analysis with technical...

Cyber Crime and the Law

Strategic Cybersecurity, Module 10: Cyber Crime and the Law. This lecture expands on the difficulty in determining computer intrusion...

Problems of Identity and Attribution

Strategic Cybersecurity, Module 9: Problems of Identity and Attribution. This lecture discusses the problem of determining identity and attribution on...

Cyber Conflict and the Law

Strategic Cybersecurity, Module 8: Cyber Conflict and the Law. Lecture 8 discusses problems that cyber technology poses for international law....

Cyber Conflict and the Westphalian System

Strategic Cybersecurity, Module 7: Cyber Conflict and the Westphalian System. The Treaty of Westphalia, signed in 1648, focused on the...

Adversaries and Advanced Persistent Threats (APTs)

Strategic Cybersecurity, Module 6: Adversaries and APTs. This lecture explains who are the United States’ adversaries in cyberspace (Russia, China,...

Vulnerabilities and Vectors

Strategic Cybersecurity, Module 5: Vulnerabilities and Vectors. This lecture describes the classification of the Internet into five distinct layers (geographic,...

Bureaucracy of Cyber Conflict

Strategic Cybersecurity, Module 4: The Bureaucracy of Cyber Conflict. This lecture provides a background of cyber conflict and considers deterrence...