M8D1: International cybersecurity Module 8 The multi-stakeholder model emerged for governance of the Internet. At present, this model has had only marginal ability to improve security outside of som

Module 8: Learning & Assessment Activities

During this module you will:

Read:

  • Required

    • Module Notes: International Cybersecurity

    • Hurwitz, R. (2014). The Play of states: Norms and security in cyberspace (https://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=99208043&site=eds-live&scope=site.)American Foreign Policy Interests36(5), 322. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=99208043&site=eds-live&scope=site

    • Kane, A. (2014). The rocky road to consensus: The work of UN Groups of Governmental Experts in the Field of ICTs and in the Context of International Security, 1998–2013 ( https://doi.org/10.1080/10803920.2014.969175.)American Foreign Policy Interests36(5), 314-321. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=99208040&site=eds-live&scope=site

    • Obama, B. (2011). International strategy for cyberspace: Prosperity, security, and openness in a networked world. (https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.) [PDF, File Size 2,318.22 KB] The White House. Available at http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf

    • Rosenzweig, P. (2012). The international governance framework for cybersecurity (http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=88174293&site=eds-live&scope=siteCanada-United States Law Journal37(2), 405-432.

    • White House Announces New Strategy to Boost Government Involvement in International Standards for Cybersecurity, Recognizes ANSI Efforts (https://search.ebscohost.com/login.aspx?direct=true&db=bwh&AN=112354002&site=eds-live&scope=site). (2016). ThomasNet News, 1. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bwh&AN=112354002&site=eds-live&scope=site

View:

  • Required

  • Webpages to review:

    • European Union Agency for Network and Information Security (Links to an external site.)

      • This website provides insight on how the European Union approaches cybersecurity.  Look at some of the areas on the topics page and compare to US institutions.

    • European Union International Cyberspace Policy (https://ec.europa.eu/digital-single-market/en/cyber-security)

      • Review the priorities of the EU cyberspace policy and compare to US policy.

    • NATO Cooperative Cyber Defence Centre of Excellence (https://ccdcoe.org/index.html.)

      • The CCDCOE is an excellent reference site for NATO and global military thought on cybersecurity issues. Its INCYDER database is a great source for finding policy and legal documents on cyberspace activities.

    • Observatory of Cybersecurity in Latin America and the Caribbean (https://publications.iadb.org/publications/english/document/Cybersecurity-Are-We-Ready-in-Latin-America-and-the-Caribbean.pdf.).

      • This site provides a quick look at cybersecurity maturity in the Western Hemisphere. Compare a few countries you have visited or might visit.

    • Organization of American States Cyber Security (https://www.sites.oas.org/cyber/EN/Pages/default.aspx.)

      • Review the web page to gain an idea of what an international organization can do to improve cybersecurity on a regional basis.

    • U.S. Department of State, Office of the Coordinator for Cyber Issues (https://www.state.gov/bureaus-offices/bureaus-and-offices-reporting-directly-to-the-secretary/office-of-the-coordinator-for-cyber-issues/)

      • The web page outlines U.S. diplomatic efforts to improve cybersecurity, internet governance, and Internet Freedom. Useful for insights on policy issues in international cybersecurity.

  • Optional

    • Creating Panic in Estonia (https://fod-infobase-com.vlib.excelsior.edu/p_ViewVideo.aspx?xtid=50121&loid=182367in Cyber wars: The hacker as hero [Video file, 02:51 minutes]. (2011). In Films On Demand. Retrieved July 1, 2016, from http://fod.infobase.com/PortalPlaylists.aspx?wID=103647&xtid=50121

    • Elazari, K. (2014) Hackers: The Internet’s immune system (https://www.ted.com/talks/keren_elazari_hackers_the_internet_s_immune_system)[Video file, 16:35 minutes]. (2014). TED talk.  Retrieved from https://www.ted.com/talks/keren_elazari_hackers_the_internet_s_immune_system

Discuss:

  • M8D1: International Cybersecurity

    • Note: Please contribute one original post in response to each discussion question.  Response should be 2-3 paragraphs or 400 words and include citations and references in APA format.