Skip to content

Latest commit

 

History

History
50 lines (31 loc) · 3.15 KB

1_hostilities_contents.md

File metadata and controls

50 lines (31 loc) · 3.15 KB

Module 1. Hostilities in Cyberspace

CC BY-NC-SA 4.0

This module of the course on Cybercrime, Cyberespionage and Cyberconflicts examines the topic of why cyberspace is such a hostile environment. It provides a short introduction to the history of the Internet and its major themes. It then discusses types of threats and abuse (the what), opponents (the who) and their intent (the why). The module concludes with a debate on how we got here and why security is hard.

Learning Outcomes

  • Understand the history and development of the Internet and its security and privacy problems.
  • Recognize different types of security incidents as classified by taxonomies used by CSIRTs.
  • Know the different types of opponents and their intent, motivations, and means.
  • Discuss and analyze the technical, legal, and ethical challenges relating to security and privacy in cyberspace.

Contents and Readings

  1. History of the Internet
  2. Types of Threats
  3. Opponents
  4. Why Security is Hard
    • No mandatory reading

Slides

The slides used in class for this module are available here.

Questions

The list of questions for this module is available here.

Further Reading