Module 3 M3D1: Department of Defense Strategy for Cybersecurity The U.S. military has taken steps to respond to the threat of cyber-attacks with the formation of U.S. Cyber Command and the developme

Module 3: Learning & Assessment Activities

During this module you will:

Read:

  • Required

    • Module Notes:  U.S. National Cybersecurity Strategy

    • Arquilla, J. (2011). From Blitzkrieg to Bitskrieg: The Military Encounter with Computers (Links to an external site.)Communications of the ACM54(10), 58-65.  Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=66736069&site=eds-live&scope=site

    • Babcock, C. (2015). Preparing for the Cyber Battleground of the Future (Links to an external site.)Air & Space Power Journal29(6), 61-73.  Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=110742248&site=eds-live&scope=site

    • Defense Cyber Strategy (Links to an external site.) [PDF, File size 6.18MB] (April 2015). Retrieved from https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF 

    • Jasper, S. (2015). Deterring Malicious Behavior in Cyberspace.  (Links to an external site.)Strategic Studies Quarterly9(1), 60.  Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=101721572&site=eds-live&scope=site

    • Kirschbaum, J. W. (2016). DOD Needs to Clarify Its Roles and Responsibilities for Defense Support of Civil Authorities during Cyber Incidents (Links to an external site.)GAO Reports, 1-27.  Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=114250318&site=eds-live&scope=site

    • Stavridis, J., & Weinstein, D. (2014). Time for a U.S. Cyber Force (Links to an external site.)U.S. Naval Institute Proceedings140(1), 40-44. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=93741719&site=eds-live&scope=site

  • Optional

    • Wilshusen, G. C., & Barkakati, N. (2013). CYBERSECURITY: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented (Links to an external site.)GAO Reports, 1.  Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=ulh&AN=86699071&site=eds-live&scope=site

View:

  • Required

    • Is There a Cyber Pearl Harbor on the Horizon? (Links to an external site.) [Video file, 04:32 minutes]. (2013). Bloomberg. Retrieved May 1, 2016, from Academic Video Online: Premium.

    • Messick, G. (Producer). (2012). Stuxnet (Links to an external site.) [Video file, 14:36 minutes]. Columbia Broadcasting System. Retrieved May 1, 2016, from Academic Video Online: Premium. 

  • Review the following webpages:

    • Department of Defense (DOD) Cyberstrategy (Links to an external site.)

      • This website serves as an information portal for the U.S. Department of Defense Cyberstrategy.  The portal provides links to current news stories, video segments, as well as fact sheets on the DOD strategy.  It is maintained by the Department of Defense and content is periodically updated.

Discuss:

  • M3D1: Department of Defense Strategy for Cybersecurity

  • M3D2: Department of Defense Organization for Cybersecurity


    • Note: Please contribute one original post in response to each discussion question.  Response should be 2-3 paragraphs or at least 300 words and include citations and references in APA format. As always be mindful of plagiarism.