International Cyber Conflicts

Methode

International Cyber Conflicts

Coursera (CC)
Logo von Coursera (CC)
Bewertung: starstarstarstar_halfstar_border 7,2 Bildungsangebote von Coursera (CC) haben eine durchschnittliche Bewertung von 7,2 (aus 6 Bewertungen)

Tipp: Haben Sie Fragen? Für weitere Details einfach auf "Kostenlose Informationen" klicken.

Beschreibung

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

About this course: By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare. Management of cyber incidents and conflicts requires an interdisciplinary perspective including an understanding of: 1) characteristics of the cyber threats and conflicts themselves, 2) international efforts to reduce and improve cyber security, and 3) psychological and sociopolitical factors. The course is designed to reach an internatio…

Gesamte Beschreibung lesen

Frequently asked questions

Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!

Noch nicht den perfekten Kurs gefunden? Verwandte Themen: Englisch, Interkulturelle Kompetenzen, Französisch, Russisch und Italienisch.

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

About this course: By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare. Management of cyber incidents and conflicts requires an interdisciplinary perspective including an understanding of: 1) characteristics of the cyber threats and conflicts themselves, 2) international efforts to reduce and improve cyber security, and 3) psychological and sociopolitical factors. The course is designed to reach an international audience and will encourage discussion on relevant current events among participants to enrich the experience with various personal and cultural perspectives on cutting-edge issues. In addition, assignments and other assessments will supplement video lectures and selected readings to ensure application of the material. After taking this course you will be able to: • Identify different types of actors involved in cyber threats (individuals, organizations & nation-states) • Distinguish between different types of threats and issues in cyber security including, data theft, political espionage, critical infrastructure protection, and propaganda • Detail the basic characteristics of the Internet infrastructure and international efforts to address Internet governance • List several international efforts to address cyber crime and espionage • Evaluate how principals that govern international conflicts might be applied in context of cyber security • Apply different psychological theories of human motivation and cooperation and communication and political theories in analysis of different international issues related to cyber security including censorship, media operations and role of social technologies. Grading: Your grade is assessed based on discussion posts and quizzes. Individual taking this course for credit (i.e. students at the University at Albany y will be required to engage in additional activities communicated to them directly). Recommended Background: No background knowledge or skills are necessary, but an understanding and familiarity of cyber security, Internet infrastructure and international law would be advantageous for anyone who participates in the course. ACKNOWLEDGEMENTS Ersin Dincelli and Nic DePaula were the instructional designers for the course who assisted in the recording of the videos, reviewing material, creating slides, assessments and some of the content. Without their tremendous effort this would not have been possible. We also acknowledge the financial support for the recordings from the University at Albany as well as the support from Media and Marketing. Finally, thanks to Lisa Stephens who is the SUNY liaison to Coursera for being a strong supporter of the MOOC.

Created by:  The State University of New York
  • Taught by:  Sanjay Goel, Associate Professor & Chair

    Information Technology Management, School of Business
  • Taught by:  Kevin Williams, Vice Provost and Professor

    Psychology - University at Albany
Language English How To Pass Pass all graded assignments to complete the course. User Ratings 4.3 stars Average User Rating 4.3See what learners said Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from your peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

The State University of New York The State University of New York, with 64 unique institutions, is the largest comprehensive system of higher education in the United States. Educating nearly 468,000 students in more than 7,500 degree and certificate programs both on campus and online, SUNY has nearly 3 million alumni around the globe.

Syllabus


WEEK 1


Introduction to Cybercrime



This module is intended to introduce you to a set of actors and motivations in the area of cyber security. After this module you will be able to identify the different threat actors and the different types of cybercrime. You will also be able to provide some preliminary analysis of cybercrime by understanding basic psychological mechanisms of motivation.


6 videos, 1 reading expand


  1. Video: Introduction to Cybercrime and Fundamental Issues
  2. Video: Evolution and Types of Cybercrime
  3. Video: Actors of Cybercrime
  4. Reading: Readings for Intro to Cybercrime
  5. Video: Understanding Motivated Behavior
  6. Video: Motives for Hacking
  7. Video: Cyber Attacks in a Global Context
  8. Discussion Prompt: Please introduce yourself

Graded: Quiz 1: Introduction to Cybercrime

WEEK 2


Internet Governance



This module covers technical aspects of the Internet and the domain name system, and efforts toward internet governance. After this module you should be able to define main components of the Internet infrastructure, identify the main issues in governance and compare different approaches to international internet policy.


5 videos, 2 readings expand


  1. Video: Internet Infrastructure
  2. Video: Domain Name System
  3. Reading: Readings for Internet Infrastructure
  4. Video: Internet Governance
  5. Video: Importance of Internet Governance
  6. Video: Current Issues in Internet Governance
  7. Reading: Readings for Internet Governance
  8. Discussion Prompt: Discussion: Internet Governance

Graded: Quiz 2: Internet Governance

WEEK 3


Cyberwarfare and International Conflicts



In this module we cover the main types of attacks, actors and conflicts that may be considered aspects of cyberwarfare. After this module you will recognize the different types of cyber threats and the modes of attacks and discuss the motivations of state and non-state actors in this domain.


7 videos, 3 readings expand


  1. Video: Introduction to Cyberwarfare
  2. Reading: Readings for Intro to Cyberwar
  3. Video: Modes of Attacks
  4. Video: Actors of Cyberwarfare
  5. Video: Types of the Attacks
  6. Reading: Readings for Modes and Types
  7. Video: Motivations of the Actors
  8. Video: Future Battles: Threats to Critical Infrastructure
  9. Reading: Readings
  10. Video: Internet Censorship
  11. Discussion Prompt: Discussion: Cyberwarfare and International Conflicts

Graded: Quiz 3: Cyberwarfare and International Conflicts

WEEK 4


Cyberwarfare and International Law



This modules covers political theories and legal arrangements pertinent to cyber security. After this module you will be able to describe principles of just war, basic aspects of International Humanitarian Law and treaties. You will be able to evaluate the particularities of dealing with states and non-state actors and the potential international solutions.


5 videos, 3 readings expand


  1. Video: Principles of Just War
  2. Video: Law of Neutrality and Humanitarian Law
  3. Reading: Readings
  4. Video: Ambiguity and Attribution
  5. Reading: Readings
  6. Video: International Treaties
  7. Video: Characteristics of Confidence Building Measures
  8. Reading: Readings
  9. Discussion Prompt: Discussion: Cyber Warfare and International Law

Graded: Quiz 4: Cyberwarfare and International Law

WEEK 5


Interpersonal Trust and Trust among Nations



This module deals more specifically with psychological explanations for individual trust and trust among nations. After this module you will be able to explain how people react in situations of giving and of trust. You will also be able to identify and discuss how confidence building measures may be applied in the domain of cyber security.


5 videos, 2 readings expand


  1. Video: Ultimatum Game and Social Norms (Part 1)
  2. Video: Ultimatum Game and Social Norms (Part 2)
  3. Video: Components of Trust and Social Capital
  4. Reading: Readings for Trust
  5. Video: Trust between Nations and Prisonner's Dilemma
  6. Video: Psychological Perspective on Confidence Building Measures
  7. Reading: Readings for CBM
  8. Discussion Prompt: Discussion: Interpersonal Trust and Trust among Nations

Graded: Quiz 5: Interpersonal Trust and Trust among Nations

Werden Sie über neue Bewertungen benachrichtigt

Es wurden noch keine Bewertungen geschrieben.

Schreiben Sie eine Bewertung

Haben Sie Erfahrung mit diesem Kurs? Schreiben Sie jetzt eine Bewertung und helfen Sie Anderen dabei die richtige Weiterbildung zu wählen. Als Dankeschön spenden wir € 1,00 an Stiftung Edukans.

Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!

Bitte füllen Sie das Formular so vollständig wie möglich aus

(optional)
(optional)
(optional)
(optional)

Haben Sie noch Fragen?

(optional)

Anmeldung für Newsletter

Damit Ihnen per E-Mail oder Telefon weitergeholfen werden kann, speichern wir Ihre Daten.
Mehr Informationen dazu finden Sie in unseren Datenschutzbestimmungen.