M8D1: International cybersecurity Module 8 The multi-stakeholder model emerged for governance of the Internet. At present, this model has had only marginal ability to improve security outside of som
Module 8: Learning & Assessment Activities
During this module you will:
Read:
Required
Module Notes: International Cybersecurity
Hurwitz, R. (2014). The Play of states: Norms and security in cyberspace (https://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=99208043&site=eds-live&scope=site.). American Foreign Policy Interests, 36(5), 322. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=99208043&site=eds-live&scope=site
Kane, A. (2014). The rocky road to consensus: The work of UN Groups of Governmental Experts in the Field of ICTs and in the Context of International Security, 1998–2013 ( https://doi.org/10.1080/10803920.2014.969175.). American Foreign Policy Interests, 36(5), 314-321. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=99208040&site=eds-live&scope=site
Obama, B. (2011). International strategy for cyberspace: Prosperity, security, and openness in a networked world. (https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.) [PDF, File Size 2,318.22 KB] The White House. Available at http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
Rosenzweig, P. (2012). The international governance framework for cybersecurity (http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=88174293&site=eds-live&scope=siteCanada-United States Law Journal, 37(2), 405-432.
White House Announces New Strategy to Boost Government Involvement in International Standards for Cybersecurity, Recognizes ANSI Efforts (https://search.ebscohost.com/login.aspx?direct=true&db=bwh&AN=112354002&site=eds-live&scope=site). (2016). ThomasNet News, 1. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bwh&AN=112354002&site=eds-live&scope=site
View:
Required
Webpages to review:
European Union Agency for Network and Information Security (Links to an external site.)
This website provides insight on how the European Union approaches cybersecurity. Look at some of the areas on the topics page and compare to US institutions.
European Union International Cyberspace Policy (https://ec.europa.eu/digital-single-market/en/cyber-security)
Review the priorities of the EU cyberspace policy and compare to US policy.
NATO Cooperative Cyber Defence Centre of Excellence (https://ccdcoe.org/index.html.)
The CCDCOE is an excellent reference site for NATO and global military thought on cybersecurity issues. Its INCYDER database is a great source for finding policy and legal documents on cyberspace activities.
Observatory of Cybersecurity in Latin America and the Caribbean (https://publications.iadb.org/publications/english/document/Cybersecurity-Are-We-Ready-in-Latin-America-and-the-Caribbean.pdf.).
This site provides a quick look at cybersecurity maturity in the Western Hemisphere. Compare a few countries you have visited or might visit.
Organization of American States Cyber Security (https://www.sites.oas.org/cyber/EN/Pages/default.aspx.)
Review the web page to gain an idea of what an international organization can do to improve cybersecurity on a regional basis.
U.S. Department of State, Office of the Coordinator for Cyber Issues (https://www.state.gov/bureaus-offices/bureaus-and-offices-reporting-directly-to-the-secretary/office-of-the-coordinator-for-cyber-issues/)
The web page outlines U.S. diplomatic efforts to improve cybersecurity, internet governance, and Internet Freedom. Useful for insights on policy issues in international cybersecurity.
Optional
Creating Panic in Estonia (https://fod-infobase-com.vlib.excelsior.edu/p_ViewVideo.aspx?xtid=50121&loid=182367in Cyber wars: The hacker as hero [Video file, 02:51 minutes]. (2011). In Films On Demand. Retrieved July 1, 2016, from http://fod.infobase.com/PortalPlaylists.aspx?wID=103647&xtid=50121
Elazari, K. (2014) Hackers: The Internet’s immune system (https://www.ted.com/talks/keren_elazari_hackers_the_internet_s_immune_system)[Video file, 16:35 minutes]. (2014). TED talk. Retrieved from https://www.ted.com/talks/keren_elazari_hackers_the_internet_s_immune_system
Discuss:
M8D1: International Cybersecurity
Note: Please contribute one original post in response to each discussion question. Response should be 2-3 paragraphs or 400 words and include citations and references in APA format.