M1D1: Defining Cybersecurity Module 1 After reading the module notes and the assigned readings, you will have formed some ideas on what defines cybersecurity. Your background, field of employment, and

Module 1: Learning & Assessment Activities

During this module you will:

Read:

  • Required

    • Module Notes:  Approaches to Cybersecurity

    • Bayuk, J. L., Schmidt, J., Weiss, J., Sachs, M. H., Healey, J., & Rohmeyer, P. (2012). Cyber Security Policy Guidebook (Links to an external site.). Hoboken: Wiley.

      • Chapter 1 pp 1-14.

    • Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity (Links to an external site.). Technology Innovation Management Review, 13.  Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=100142627&site=eds-live&scope=site

    • Harknett, R. J., & Stever, J. A. (2011). The New Policy World of Cybersecurity.  (Links to an external site.)Public Administration Review71(3), 455-460. doi:10.1111/j.1540-6210.2011.02366.x. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=60467442&site=eds-live&scope=site

    • Moore, T. (2010). The economics of cybersecurity: Principles and policy options.  (Links to an external site.)International Journal of Critical Infrastructure Protection3103-117. doi:10.1016/j.ijcip.2010.10.002. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edselp&AN=S1874548210000429&site=eds-live&scope=site

    • Mulligan, D. K., & Schneider, F. B. (2011). Doctrine for Cybersecurity.  (Links to an external site.)Daedalus, 140(4), 70–92. Retrieved from http://vlib.excelsior.edu/login?url=http://search.proquest.com.vlib.excelsior.edu/docview/903303254?accountid=134966

  • Optional

    • Baker, E. W. (2014). A Model for the Impact of Cybersecurity Infrastructure on Economic Development in Emerging Economies: Evaluating the Contrasting Cases of India and Pakistan (Links to an external site.). Information Technology For Development, 20(2), 122-139. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=95593148&site=eds-live&scope=site

    • China internet: Xi Jinping calls for “cyber sovereignty.” (Links to an external site.) (2015, Dec 16). Retrieved from http://www.bbc.com/news/world-asia-china-35109453

View:

  • Required

    • Code wars: America's cyber threat – Introduction (Links to an external site.). [Video file, 01:19 minutes]. (2011). In Films On Demand. Retrieved from http://vlib.excelsior.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=103647&xtid=47288&loid=139413

  • Optional

    • Code wars: America's cyber threat – Full Video (Links to an external site.) [Video file, 43:19 mins]. (2011). In Films On Demand.  Retrieved from http://vlib.excelsior.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=103647&xtid=47288  

Discuss:

  • M1D1: Defining Cybersecurity

  • M1D2: Cybersecurity Paradigms

    • Note: Please contribute one original post in response to each discussion question.  Response should be 2-3 paragraphs and include citations and references in APA format.  Provide substantive responses to at least 2 fellow students


Use the EC Library resources for research assistance and to properly cite your work:

  • Military Leadership Research Guide (Links to an external site.)

  • National Security Research Guide (Links to an external site.)

  • Plagiarism & Copyright (Links to an external site.)

  • Excelsior Library Writing Help (Links to an external site.)

  • APA Citation Help (Links to an external site.)

  • Excelsior College Online Writing Lab (OWL)