M1D1: Defining Cybersecurity Module 1 After reading the module notes and the assigned readings, you will have formed some ideas on what defines cybersecurity. Your background, field of employment, and
Module 1: Learning & Assessment Activities
During this module you will:
Read:
Required
Module Notes: Approaches to Cybersecurity
Bayuk, J. L., Schmidt, J., Weiss, J., Sachs, M. H., Healey, J., & Rohmeyer, P. (2012). Cyber Security Policy Guidebook (Links to an external site.). Hoboken: Wiley.
Chapter 1 pp 1-14.
Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity (Links to an external site.). Technology Innovation Management Review, 13. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=100142627&site=eds-live&scope=site
Harknett, R. J., & Stever, J. A. (2011). The New Policy World of Cybersecurity. (Links to an external site.)Public Administration Review, 71(3), 455-460. doi:10.1111/j.1540-6210.2011.02366.x. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=60467442&site=eds-live&scope=site
Moore, T. (2010). The economics of cybersecurity: Principles and policy options. (Links to an external site.)International Journal of Critical Infrastructure Protection, 3103-117. doi:10.1016/j.ijcip.2010.10.002. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edselp&AN=S1874548210000429&site=eds-live&scope=site
Mulligan, D. K., & Schneider, F. B. (2011). Doctrine for Cybersecurity. (Links to an external site.)Daedalus, 140(4), 70–92. Retrieved from http://vlib.excelsior.edu/login?url=http://search.proquest.com.vlib.excelsior.edu/docview/903303254?accountid=134966
Optional
Baker, E. W. (2014). A Model for the Impact of Cybersecurity Infrastructure on Economic Development in Emerging Economies: Evaluating the Contrasting Cases of India and Pakistan (Links to an external site.). Information Technology For Development, 20(2), 122-139. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=95593148&site=eds-live&scope=site
China internet: Xi Jinping calls for “cyber sovereignty.” (Links to an external site.) (2015, Dec 16). Retrieved from http://www.bbc.com/news/world-asia-china-35109453
View:
Required
Code wars: America's cyber threat – Introduction (Links to an external site.). [Video file, 01:19 minutes]. (2011). In Films On Demand. Retrieved from http://vlib.excelsior.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=103647&xtid=47288&loid=139413
Optional
Code wars: America's cyber threat – Full Video (Links to an external site.) [Video file, 43:19 mins]. (2011). In Films On Demand. Retrieved from http://vlib.excelsior.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=103647&xtid=47288
Discuss:
M1D1: Defining Cybersecurity
M1D2: Cybersecurity Paradigms
Note: Please contribute one original post in response to each discussion question. Response should be 2-3 paragraphs and include citations and references in APA format. Provide substantive responses to at least 2 fellow students
Use the EC Library resources for research assistance and to properly cite your work:
Military Leadership Research Guide (Links to an external site.)
National Security Research Guide (Links to an external site.)
Plagiarism & Copyright (Links to an external site.)
Excelsior Library Writing Help (Links to an external site.)
APA Citation Help (Links to an external site.)
Excelsior College Online Writing Lab (OWL)