CPOL 523 Cyber Warfare Strategy and Policy Assignment

Assignment Help Other Subject
Reference no: EM132444013

CPOL 523: Cyber Warfare Strategy and Policy - Catholic University

Learninq Outcomes: During this course, students will demonstrate an understanding of:

1) the evolution of cyber warfare and the basic characteristics and methods of CNA, CND, and CNE;

2) the current national policies, doctrines, and strategies relative to cyber warfare; and

3) the potential impact of cyber warfare on future international conflicts.

Analytic Policy Memo: Students will write an analytic policy memo addressed to the National Security Council's Cybersecurity Coordinator regarding a specific scenario assigned during the course. This memo should be between 1,000-1,500 words in length and directly address the policy issues presented in the scenario, identify options, and offer specific recommendations.

Research Paper: Students will write an approximately 4.000-word (15 pages, double spaced) research paper on an approved topic of their choice related to CNA and/or CNE.

Part One: Introduction to Cyberspace and Cyber Warfare (Offense and Defense)

Module One:

Learning Activity:
o In the discussion board, post an introduction of yourself, discussing 1) your background, and 2) what you hope to get out of this course/why you are taking this course.
o Consider what module you would like to sign up to serve as a discussion leader and sign up before the end of the first week.
o To maintain situational awareness of cyber current events during the course (and after, if you wish), subscribe to:
Council on Foreign Relations "Net Politics" blog updates

Module Two: Introduction to the Cyberspace Domain and Cyber Conflict

Learning Activity: In the discussion board, respond to the following:
o How did the history of the Internet's formation shape its security concerns today?
o In what ways is cyberspace analogous to the "natural" physical domains of land, sea, air, and water? In what ways is it different?

Module Three: Computer Network Exploitation and Cyber Crime

Learning Activity: In the discussion board, respond to the following
o Is it important to distinguish between different types of cyber attacks?
How should we do it?
o What risk, if any, do breakthroughs in quantum computing, neuromorphic computing, etc. pose to modern cryptography as an effective method to defend against CNE?

Module Four: Computer Network Attack

Learning Activity: In the discussion board, respond to the following:
o Is cyberspace at risk of being "militarized"?
o Is CNA properly categorized as a form of warfare/armed conflict or sabotage/clandestine action? Why does the answer matter?

Module Five: Computer Network Defense and Response

Learning Activity: In the discussion board, respond to the following:
o What is the greatest challenge facing the United States in defending against cyber attacks, and why?
o Where does the responsibility of private firms begin and end in cybersecurity?

Module Six: Cyber Deterrence

Learning Activity: In the discussion board, respond to the following:
o What kind of cyber attacks, if any, can be reliably deterred, and why?
o What will be the greatest impact on international relations of the fact that cyberspace appears to be offense-dominant?

Part Two: State-Based Cyber Warfare

Module Seven: U.S. and Israeli Cyber Warfare

Learning Activity: In the discussion board, respond to the following:
o What are the implications of the U.S.'s shift to focus on persistent engagement in cyberspace and why did it pursue this new approach?
o What can the United States learn from Israel's approach to cyber warfare?

Module Eight: Chinese and Russian Cyber Warfare

Learning Activity: In the discussion board, respond to the following:
o How might China use cyber weapons should a conflict with the U.S. occur over the South China Sea or Taiwan?
• What does Russia's use of cyber operations alongside physical operations in Georgia and Ukraine signal for the future of cyber warfare?

Module Nine: Iranian and North Korean Cyber Warfare

Learning Activity: In the discussion board, respond to the following:
o What does Iran and North Korea's development of sophisticated cyber capabilities portend for the international diffusion of cyber weapons?
Had the United States and/or Israel not allegedly engaged in CNA operations against Iran (e.g. Stuxnet), would Iran have still have developed its cyber capabilities?

Module Ten: Ethics, Norms, and International Law for Cyber Warfare

Learning Activity: In the discussion board, respond to the following:

Should the U.S. unilaterally disavow offensive certain cyber weapons (as President Nixon did with offensive biological weapons) in order to promote a norm against possessing or using such weapons?

o Would using ISPs to cut off/block all Internet traffic from a country and effectively enact a "cyber blockade" be an act of war in cyberspace?

• Analytic Policy Memo Due (emailed to instructor who will then upload/post in Module Eleven, per below)

Part Three: Non-State Cyber Warfare

Module Eleven: Terrorism and Cyberspace

Learning Activity: In the discussion board, respond to the following:

What recommended options from your colleagues' analytic policy memos did you find 1) most compelling and 2) least compelling? Please explain your rationale for each.

o Why have terrorists not yet successfully conducted a major CNA-style attack in cyberspace?

Module Twelve: Hackers and Social Activism

Learning Activity: In the discussion board, respond to the following:
o How do non-state actors use cyberspace to promote advocacy or achieve objectives? How is this activity evolving and where might it go in the future?
o Can you truly be anonymous online? Should you be?
Part Four: The Future of Cyber Warfare

Module Thirteen: The Future Cyber Warfare: U.S. Dimensions

Learning Activity: In the discussion board, respond to the following:
o How, if at all, should the United States share identified zero-day vulnerabilities with private industry to mitigate the vulnerability?
o Should the United States issue letters of marque and reprisal to authorize private persons (privateers) to "hack back" and attack and destroy bad actors in cyberspace?

Module Fourteen: The Future of Cyber Warfare: International Dimensions

Learning Activity: In the discussion board, respond to the following:
o What are the emerging and future technologies that we will have to worry the most about from a security perspective?
o Who will win the fight for the future of 5G and why does this matter?

Attachment:- Cyber Warfare Strategy and Policy.rar

Reference no: EM132444013

Questions Cloud

What do we call a company that runs : What do we call a company that runs most or all of its company from the internet?
What do we call the small firms that afford their owner : What do we call the Small firms that afford their owner(s) a similar level of income to what they would earn in a conventional job?
How financial information is used make a particular decision : Summarize each method, and discuss how the financial information is used to make a particular decision.Provide a scenario in a health care situation
How are the practices different from one to another society : During the ritual process, what role does the sacred or supernatural play within the event? How are the practices different from one to another society
CPOL 523 Cyber Warfare Strategy and Policy Assignment : CPOL 523: Cyber Warfare Strategy and Policy Assignment Help and Solution, Catholic University Homework Help - the potential impact of cyber warfare on future
Reflect on the artifact chosen its prison reform : Reflect on the artifact chosen its Prison Reform.What is the purpose of this artifact? Who is the audience for this artifact? What genre or medium is artifact?
What are the type of finance accounting sheets : What are the type of finance accounting sheets for proposals.
Identify an issue that can occur within the hospital : Identify an issue that can occur within the hospital, physician office, a community health service (e.g., mental health, meals-on-wheels, Planned Parenthood)
Most familiar type of auction is the familiar : The most familiar type of auction is the familiar open ascending-bid auction, which is also called an English auction. Give me more insight on this auction.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd