Latest stories

  • in ,

    Privacy

    Privacy.

    Strategic Cybersecurity, Module 12: Privacy. This lecture discusses privacy concerns on the Internet. The module clarifies that concerns exist not just in the United States but also in the rest of the world. The Objectives Once you have completed the readings, lecture, activity, and assessment, you will be able to Describe the Internet of Things […] More

  • in ,

    Dataveillance

    The Concept of Dataveillance

    Strategic Cybersecurity, Module 11: The Concept of Dataveillance. This lecture discusses the concept of combining big data analysis with technical surveillance, or “dataveillance.” The module looks at two trends enabling the ability for dataveillance: nearly exponential increases in computer power and similar decreases in the cost of data storage. The Objective Once you have completed […] More

  • in ,

    Cyber Crime and the Law

    Cyber Crime and the Law 1

    Strategic Cybersecurity, Module 10: Cyber Crime and the Law. This lecture expands on the difficulty in determining computer intrusion attribution by discussing the challenges of constructing laws to deal with such criminal activity. The Objective Once you have completed the readings, lecture, activity, and assessment, you will be able to Describe why cybercrime investigations are […] More

  • in ,

    Problems of Identity and Attribution

    Problems of Identity and Attribution. 1

    Strategic Cybersecurity, Module 9: Problems of Identity and Attribution. This lecture discusses the problem of determining identity and attribution on the Internet. References are made to such events as “Ghost-Net” and Russia’s meddling in the 2016 U.S. presidential election via social media. The Objectives Once you have completed the readings, lecture, activity, and assessment you […] More

  • in ,

    Cyber Conflict and the Law

    Cyber Conflict and the Law

    Strategic Cybersecurity, Module 8: Cyber Conflict and the Law. Lecture 8 discusses problems that cyber technology poses for international law. In particular, the module focuses on two aspects of international law that deal with the question of armed conflict: Jus Ad Bellum, or “the right to wage war,” and Jus In Bello, or “justice in […] More

  • in ,

    Cyber Conflict and the Westphalian System

    Popular

    Cyber Conflict and the Westphalian System

    Strategic Cybersecurity, Module 7: Cyber Conflict and the Westphalian System. The Treaty of Westphalia, signed in 1648, focused on the principle that “whoever rules the territory determines the religion.” This lecture explains this treaty and how it connects with cybersecurity. Though this course is not an international relations course, this topic is pertinent to the […] More

  • in ,

    Adversaries and Advanced Persistent Threats (APTs)

    Adversaries and APTs

    Strategic Cybersecurity, Module 6: Adversaries and APTs. This lecture explains who are the United States’ adversaries in cyberspace (Russia, China, Iran, and North Korea) and their varying offensive cyber capabilities to effect various outcomes. The module also introduces the idea of Advanced Persistent Threats (APTs), which is how countries organize their capabilities to conduct cyber […] More

  • in ,

    Vulnerabilities and Vectors

    Vulnerabilities and Vectors

    Strategic Cybersecurity, Module 5: Vulnerabilities and Vectors. This lecture describes the classification of the Internet into five distinct layers (geographic, physical network, logic, cyber persona, and persona) and the vulnerabilities of each of those layers. The module also looks at common types of cyber attacks. The Objective Once you have completed the readings, lecture, activity, […] More

  • in ,

    Bureaucracy of Cyber Conflict

    The Bureaucracy of Cyber Conflict

    Strategic Cybersecurity, Module 4: The Bureaucracy of Cyber Conflict. This lecture provides a background of cyber conflict and considers deterrence systems (or lack thereof). The Objectives Once you have completed the readings, lecture activity, and assessment, you will be able to: Describe how President Ronald Reagan was alerted to the problem of cybersecurity Describe the […] More

  • in ,

    Historical Foundations of the Internet

    Historical Foundations of the Internet

    Strategic Cybersecurity, Module 3: Historical Foundations of the Internet. This lecture offers a historical perspective of the development of the Internet, describing events that led to the rise of the Internet. These events include the development of the Advanced Research Projects Agency (ARPA), The Manhattan Project, and ARPANET. The Objectives Once you have completed the […] More

  • in ,

    Understanding Binary and the DNS

    Popular

    Understanding Binary and the DNS

    Strategic Cybersecurity, Module 2: Understanding Binary and the DNS. This lecture focuses on two main ideas about digital information: how digital information is stored, and how that stored information is translated into textual data.   The Objectives Once you have completed the readings, lecture, activity, and assessment, you will be able to: Articulate the connection […] More

  • in ,

    Cybersecurity: An Interdisciplinary Approach

    Popular

    An Interdisciplinary Approach

    Strategic Cybersecurity, Module 1: Cybersecurity: An Interdisciplinary Approach. This lecture is an introduction to the course “Strategic Cybersecurity,” introducing its survey nature, noting the textbooks that the course uses, and briefly explaining the logistics of the course. The Objectives Once you have completed the readings, lecture, activity, and assessment, you will be able to: Identify […] More

Load More
Congratulations. You've reached the end of the internet.