20764 - STATE COMPETITION AND CONFLICTS IN THE CYBER SPACE
Department of Social and Political Sciences
COLIN PRESCOTT MacARTHUR
Mission & Content Summary
MISSION
CONTENT SUMMARY
Part 1: Cyber warfare and politics
- The technical side of state-level cyber weapons
- Recent history of state-targeted cyber attacks
- The role of laws, norms, attribution and deterrence in cyber conflict
- European, American, Russian, Chinese and smaller actor initiatives and responses to cyber conflict
Part 2: Government cybersecurity operations
- European and American government cyber teams
- Incident response tactics
- Cyber risk management processes
- Up-and-coming tools and methods for ensuring security
- The next generation of threats to governments from artificial intelligence
- Effective security advocacy within government
Intended Learning Outcomes (ILO)
KNOWLEDGE AND UNDERSTANDING
- describe the key attributes of modern cyber conflict and warfare
- offer examples of cyber conflict from selected countries
APPLYING KNOWLEDGE AND UNDERSTANDING
- identify, research and explain a state’s approach to cyber offense and defense;
- explain multiple new governance approaches, operational tools or methods to address government cyber security threats;
- present a well-reasoned proposal for a new government cybersecurity tool or method;
Teaching methods
- Guest speaker's talks (in class or in distance)
- Collaborative Works / Assignments
- Interaction/Gamification
DETAILS
Students will learn foundational concepts of cyber conflict and government operations through lectures, guest speaker talks and case studies. They will apply learnings during in-class exercises and simulations. Students will practice developing and expressing opinions on state cybersecurity issues during in-class discussion.
During a semester-long group project, students may:
- present an analysis of a particular country’s cyber offensive and defensive strategy to the class
- develop a proposal for a tool or method for addressing a common challenge of government cybersecurity operations and present it to the class for assessment and discussion.
Attendance: As the teaching methodology is heavily based on in-class discussion, exercises and presentations, attendance is recommended.
Assessment methods
Continuous assessment | Partial exams | General exam | |
---|---|---|---|
|
x | ||
|
x |
ATTENDING STUDENTS
To measure student’s acquisition of the above learning outcomes, student assessment is based on four main components:
- Group presentations (40% of the final grade). To assess the student’s ability to research and explain a state’s approach to cyber offense and defense; present a well-reasoned proposal for a new government cybersecurity tool or method to meet one of those threats. There will be two presentations, as described above.
- A written, individual exam with multiple choice (60% of the final grade).
NOT ATTENDING STUDENTS
- 2 recorded individual presentations (40% of the final grade). To assess the student’s ability to research and explain a state’s approach to cyber offense and defense; present a well-reasoned proposal for a new government cybersecurity tool or method to meet one of those threats. These presentations will cover the same content (and be of the same duration) as the attending students presentations.
- A written, individual exam with multiple choice (60% of the final grade).
Teaching materials
ATTENDING AND NOT ATTENDING STUDENTS
To be provided on the eLearning platform.