SlideShare a Scribd company logo
1 of 10
Weeks1-2_MyLastName.doc/x
Weeks 1-2 Written Assignment
(submit here as
single
MS Word file)
·
Part 1
(refer to
Week
1
Readings in the Lessons for Week 1
)
o Provide an aprox. 1000-word in-depth evaluation of three
articles of your choice from the Week 1 Reading List.
§
What are the strengths and weaknesses of each?
§
What is the most and lest persuasive premise, claim or rebuttal?
o
Conclude with a research or policy question for further research
o You must utilize literature and cite properly. Use style.APA
·
Part 2
o (
Title each response with the text of each question)
o
Has U.S. federal government developed a robust legal,
regulatory and policy framework to address cyber security
challenges? Why? Why not?
o
Conclude with a research question
or
policy question for further research.
o You must utilize APA (cite, reference, list) required
Week 2 Readings
.
· Submit both Parts as
single
Microsoft Word document.
· Name the file "
EDMG600Weeks1-2_YourLastName.doc/x
" (e.g., EDMG600Week1-2_Pesic.doc/x).
· Upload the document under Weeks1-2 Assignments.
Week 1
Reading and Resources
Reading Assignment
Choose and read
three
articles from the list bellow:
Kello, L. (2013).
The meaning of the cyber revolution: Perils to theory and
statecraft
.
International Security,
Fall 2013.
Gartzke, E. (2013).
The myth of cyberwar: Bringing war in cyberspace back
down to earth
.
International Security,
Fall 2013.
Arquilla, J. (2012).
Cyberwar is already upon us
.
Foreign Policy
. March/April, 2012.
Brown, G. & Poellet, K. (2012).
The Customary International Law of Cyberspace
.
Strategic Studies Quarterly,
6, no. 3, pp. 126-145.
Caplan, N. (2013).
Cyber War: the Challenge to National Security
.
Global Security Studies
, Winter 2013, Volume 4, Issue
Studentnummer, L. van den Boom (2012).
The dilemmas of state response to cyber attacks.
Understanding the phenomena, challenges and legal
response
. Vrije Universiteit Amsterdam:
Paper Governance of Security and Policing
.
Crosston, M. D. (2011).
World Gone Cyber MAD: How 'Mutually Assured
Debilitation' Is the Best Hope for Cyber Deterrence
.
Strategic Studies Quarterly,
5, no. 1, pp. 100-116.
Goldsmith, J. (2011).
Cybersecurity Treaties: A Skeptical View
. A Future Challenges Essay. Hoover Institution.
Mudrinich, E. (2012).
Cyber 3.0: the Department of Defense strategy for
operating in cyberspace and the attribution problem
.
Guinchard, A. (2011).
Between Hype and Understatement: Reassessing Cyber
Risks as a Security Strategy
.
Journal of Strategic Security
Volume 4 Number 2 Summer 2011.
Khosla, P. (2009).
Information Security for the Next Century
.
Carnegie Mellon CyLab.
Hansen, L., & Nissenbaum, H. (2009).
Digital disaster, cyber security, and the Copenhagen School
.
International Studies Quarterly
, 53(4), pp. 1155-1175.
Kusiak, P. (2012).
Culture, Identity, and Information Technology in the 21st
Century: Implications for U.S. National Security
.
Carlisle Barracks: U.S. Army War College, Strategic
Studies Institute.
Libicki, M. C. (2012).
Crisis and Escalation in Cyberspace
. Santa Monica: RAND.
Nye, J. (2011).
Nuclear lessons for cyber security
.
Strategic Studies Quarterly
. Winter 2011.
Rid T. (2012).
Think again: Cyberwar
.
Foreign Policy
. March/April, 2012.
Robinson, N., Gribbon, L., Horvath, V. & Robertson, K.
(2013).
Cyber-security threat characterisation: A rapid comparative
analysis
. RAND Europe.
Schilling, J. R. (2010).
Defining Our National Cyberspace Boundaries
. Strategy Research Project. Carlisle Barracks: U.S. Army
War College.
Schneider, F. B. & Birman, K.B. (2009).
The monoculture risk put into context
. IEEE
Security & Privacy
.
Schneider, F. & Mulligan, D. (2011).
Doctrine for cybersecurity
.
Daedalus
. Fall 2011, pp. 70-92.
Steptoe Cyberblog (2012).
The hackback debate
. Nov. 2, 2012.
Ahmad, R. & Yunos, Z (2012).
The Application of Mixed Method in Developing a Cyber
Terrorism Framework
.
Journal of Information Security
, 2012, 3, pp. 209-214.
Gourley, B. (2009).
Open Source Software and Cyber Defense
. A White Paper provided to the National Security Council
and Homeland Security Council as input to the White
House Review of Communications and Information
Infrastructure.
Cote, R. (2011).
The Strategic Paradox of Social Networks
.
Strategy Research Project
. Carlisle Barracks: U.S. Army War College.
Week 2
Reading and Resources
Week 2 Reading Assignment
Required
: Rollings, J. & Henning, A. C. (2009).
Comprehensive National Cybersecurity Initiative: Legal
Authorities and Policy Considerations
.
Congressional Research Service.
Required:
Fischer, E. A. (2012).
Federal Laws Relating to Cybersecurity: Discussion of
Proposed Revisions
. Washington, DC: U.S. Library of Congress, Congressional
Research Service.
Required
: The White House (2011).
The Comprehensive National Cybersecurity Initiative
. Washington, D.C.
Required:
The White House (2011).
International Strategy for Cyberspace: Prosperity, Security,
and Openness in a Networked World
. Washington, DC: The White House
(please bepatient when downloading. It may take up to five
minutes to download the document).
Required
: Department of Homeland Security (2011).
Blueprint for a Secure Cyber Future
.
Electronic Frontier Foundation,
To the White House Cyber Security Review Team
.
The White House (2009).
Cyberspace Policy Review
.
The White House (2011).
National Strategy for Trusted Identities in Cyberspace:
Enhancing Online Choice, Efficiency, Security, and Privacy
. Washington, D.C.
Federal Reserve Bank of Dallas (2003).
Interagency Paper on Sound Practices to Strengthen the
Resilience of the U.S. Financial System
.
United States. Government Accountability Office (GAO)
(2011).
Information security: Additional guidance needed to address
cloud computing concerns
.
Internet Security Alliance (2008).
The Cyber Security Social Contract Policy
Recommendations for the Obama Administrations and 111th
Congress
.
Owens, W. A., Dam, K. W. & Lin, H. S. (Eds.) (2009).
Technology, policy, law, and ethics regarding U.S.
acquisition and use of cyber attack capabilities
. National Research Council. Committee on Offensive
Information Warfare. The National Academies Press.
Committee on Deterring Cyberattacks, National Research
Council (2010).
Proceedings of a Workshop on Deterring Cyberattacks:
Informing Strategies and Developing Options for U.S. Policy
.
National Research Council (2009).
Beyond 'Fortress America': National Security Controls on
Science and Technology in a Globalized World
.
Brecht, L. A. (2009).
National cyber systems infrastructure security review
concept paper
.
Capital Markets Research.
My last week assignment bellow:
Conclude with a research or policy question for further
research.
Is cyberwar upon us and application of mixed method in
developing a cyber terrorism framework .
Reference
http://file.scirp.org/Html/5-7800087_21342.htm
https://www.thefreelibrary.com/_/print/PrintArticle.aspx?id=29
7309173
http://foreignpolicy.com/2012/02/27/cyberwar-is-already-upon-
us/

More Related Content

Similar to Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx

Academic Research Article CritiqueThe final assignment for t
Academic Research Article CritiqueThe final assignment for tAcademic Research Article CritiqueThe final assignment for t
Academic Research Article CritiqueThe final assignment for t
latashiadegale
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
TaunyaCoffman887
 
ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...
ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...
ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...
Maurice Dawson
 
Dragomir R
Dragomir RDragomir R
Dragomir R
butest
 
Jackie Rees
Jackie ReesJackie Rees
Jackie Rees
butest
 
Each question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referEach question should be done on a separate word document, with refer
Each question should be done on a separate word document, with refer
wildmandelorse
 
Final Paper Draft Outline – Week 7 For the second to last.docx
Final Paper Draft Outline – Week 7  For the second to last.docxFinal Paper Draft Outline – Week 7  For the second to last.docx
Final Paper Draft Outline – Week 7 For the second to last.docx
charlottej5
 

Similar to Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx (20)

CeB - f - s01
CeB - f - s01CeB - f - s01
CeB - f - s01
 
Academic Research Article CritiqueThe final assignment for t
Academic Research Article CritiqueThe final assignment for tAcademic Research Article CritiqueThe final assignment for t
Academic Research Article CritiqueThe final assignment for t
 
2 pgapa format 3 sourcesThe threat posed by cyber acto
2 pgapa format 3 sourcesThe threat posed by cyber acto2 pgapa format 3 sourcesThe threat posed by cyber acto
2 pgapa format 3 sourcesThe threat posed by cyber acto
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
Decomposing Social and Semantic Networks in Emerging “Big Data” Research
Decomposing Social and Semantic Networks in Emerging “Big Data” ResearchDecomposing Social and Semantic Networks in Emerging “Big Data” Research
Decomposing Social and Semantic Networks in Emerging “Big Data” Research
 
Are we ready for Cyberwarfare
Are we ready for CyberwarfareAre we ready for Cyberwarfare
Are we ready for Cyberwarfare
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
 
ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...
ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...
ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
 
Dragomir R
Dragomir RDragomir R
Dragomir R
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information Technology
 
Jackie Rees
Jackie ReesJackie Rees
Jackie Rees
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
Each question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referEach question should be done on a separate word document, with refer
Each question should be done on a separate word document, with refer
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Final Paper Draft Outline – Week 7 For the second to last.docx
Final Paper Draft Outline – Week 7  For the second to last.docxFinal Paper Draft Outline – Week 7  For the second to last.docx
Final Paper Draft Outline – Week 7 For the second to last.docx
 
Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...
 
Kurnava+Book+Review (1)
Kurnava+Book+Review (1)Kurnava+Book+Review (1)
Kurnava+Book+Review (1)
 
New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...
 
Hidden Gems in the Wikipedia discussions: The Wikipedians' Rationales
Hidden Gems in the Wikipedia discussions: The Wikipedians' RationalesHidden Gems in the Wikipedia discussions: The Wikipedians' Rationales
Hidden Gems in the Wikipedia discussions: The Wikipedians' Rationales
 

More from loganta

Paper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxPaper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docx
loganta
 
Paper PromptSwing- From Verb to Noun is the title Leroi Jones g.docx
Paper PromptSwing- From Verb to Noun is the title Leroi Jones g.docxPaper PromptSwing- From Verb to Noun is the title Leroi Jones g.docx
Paper PromptSwing- From Verb to Noun is the title Leroi Jones g.docx
loganta
 
Page 1 Planning LTE Network Deployments Introduction LTE (Long Term .docx
Page 1 Planning LTE Network Deployments Introduction LTE (Long Term .docxPage 1 Planning LTE Network Deployments Introduction LTE (Long Term .docx
Page 1 Planning LTE Network Deployments Introduction LTE (Long Term .docx
loganta
 
Pages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docx
Pages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docxPages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docx
Pages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docx
loganta
 
OverviewOver the course of the semester you will prepare a m.docx
OverviewOver the course of the semester you will prepare a m.docxOverviewOver the course of the semester you will prepare a m.docx
OverviewOver the course of the semester you will prepare a m.docx
loganta
 
OverviewIn our study of poetry, we have discussed several key po.docx
OverviewIn our study of poetry, we have discussed several key po.docxOverviewIn our study of poetry, we have discussed several key po.docx
OverviewIn our study of poetry, we have discussed several key po.docx
loganta
 
PA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docx
PA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docxPA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docx
PA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docx
loganta
 
OverviewIn this project you will implement a server for the Purdue.docx
OverviewIn this project you will implement a server for the Purdue.docxOverviewIn this project you will implement a server for the Purdue.docx
OverviewIn this project you will implement a server for the Purdue.docx
loganta
 
OverviewIf there is one important lesson you can learn as social s.docx
OverviewIf there is one important lesson you can learn as social s.docxOverviewIf there is one important lesson you can learn as social s.docx
OverviewIf there is one important lesson you can learn as social s.docx
loganta
 
Over 600,000 Americans lost their lives in the Civil War, with the N.docx
Over 600,000 Americans lost their lives in the Civil War, with the N.docxOver 600,000 Americans lost their lives in the Civil War, with the N.docx
Over 600,000 Americans lost their lives in the Civil War, with the N.docx
loganta
 

More from loganta (20)

Paper Needed only 3 to 4 pagesAPATimes New Roman - 12 FontP.docx
Paper Needed only 3 to 4 pagesAPATimes New Roman - 12 FontP.docxPaper Needed only 3 to 4 pagesAPATimes New Roman - 12 FontP.docx
Paper Needed only 3 to 4 pagesAPATimes New Roman - 12 FontP.docx
 
Paper format APA WORDS 275subject Environmental studies and .docx
Paper format APA WORDS 275subject Environmental studies and .docxPaper format APA WORDS 275subject Environmental studies and .docx
Paper format APA WORDS 275subject Environmental studies and .docx
 
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bib.docx
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bib.docxPaper 2 will be not less than 8 pages PLUS a cover sheet and a bib.docx
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bib.docx
 
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bibli.docx
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bibli.docxPaper 2 will be not less than 8 pages PLUS a cover sheet and a bibli.docx
Paper 2 will be not less than 8 pages PLUS a cover sheet and a bibli.docx
 
Paper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxPaper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docx
 
Paper PromptSwing- From Verb to Noun is the title Leroi Jones g.docx
Paper PromptSwing- From Verb to Noun is the title Leroi Jones g.docxPaper PromptSwing- From Verb to Noun is the title Leroi Jones g.docx
Paper PromptSwing- From Verb to Noun is the title Leroi Jones g.docx
 
Paper must be APA format.  Integrate worldview as well as Bible refe.docx
Paper must be APA format.  Integrate worldview as well as Bible refe.docxPaper must be APA format.  Integrate worldview as well as Bible refe.docx
Paper must be APA format.  Integrate worldview as well as Bible refe.docx
 
Page 1 Planning LTE Network Deployments Introduction LTE (Long Term .docx
Page 1 Planning LTE Network Deployments Introduction LTE (Long Term .docxPage 1 Planning LTE Network Deployments Introduction LTE (Long Term .docx
Page 1 Planning LTE Network Deployments Introduction LTE (Long Term .docx
 
Pages1, Double spacedSources1Order typeEssaySubject.docx
Pages1, Double spacedSources1Order typeEssaySubject.docxPages1, Double spacedSources1Order typeEssaySubject.docx
Pages1, Double spacedSources1Order typeEssaySubject.docx
 
Pages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docx
Pages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docxPages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docx
Pages 2Topic Vietnam warStyle ChicagoSources 5Level Col.docx
 
OverviewGlobal organizations have branches that are located .docx
OverviewGlobal organizations have branches that are located .docxOverviewGlobal organizations have branches that are located .docx
OverviewGlobal organizations have branches that are located .docx
 
OverviewThe tasks in this assignment focus on the concept of organ.docx
OverviewThe tasks in this assignment focus on the concept of organ.docxOverviewThe tasks in this assignment focus on the concept of organ.docx
OverviewThe tasks in this assignment focus on the concept of organ.docx
 
P4-4 How is the compounding process related to the payment of.docx
P4-4 How is the compounding process related to the payment of.docxP4-4 How is the compounding process related to the payment of.docx
P4-4 How is the compounding process related to the payment of.docx
 
OverviewOver the course of the semester you will prepare a m.docx
OverviewOver the course of the semester you will prepare a m.docxOverviewOver the course of the semester you will prepare a m.docx
OverviewOver the course of the semester you will prepare a m.docx
 
OverviewIn our study of poetry, we have discussed several key po.docx
OverviewIn our study of poetry, we have discussed several key po.docxOverviewIn our study of poetry, we have discussed several key po.docx
OverviewIn our study of poetry, we have discussed several key po.docx
 
PA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docx
PA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docxPA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docx
PA301 Week 7 TestQUESTION 1List Weber’s three ideal types of.docx
 
OverviewIn this project you will implement a server for the Purdue.docx
OverviewIn this project you will implement a server for the Purdue.docxOverviewIn this project you will implement a server for the Purdue.docx
OverviewIn this project you will implement a server for the Purdue.docx
 
OverviewIf there is one important lesson you can learn as social s.docx
OverviewIf there is one important lesson you can learn as social s.docxOverviewIf there is one important lesson you can learn as social s.docx
OverviewIf there is one important lesson you can learn as social s.docx
 
Over 600,000 Americans lost their lives in the Civil War, with the N.docx
Over 600,000 Americans lost their lives in the Civil War, with the N.docxOver 600,000 Americans lost their lives in the Civil War, with the N.docx
Over 600,000 Americans lost their lives in the Civil War, with the N.docx
 
Over the long period of time that life has existed on Earth, there.docx
Over the long period of time that life has existed on Earth, there.docxOver the long period of time that life has existed on Earth, there.docx
Over the long period of time that life has existed on Earth, there.docx
 

Recently uploaded

Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
PUBLIC FINANCE AND TAXATION COURSE-1-4.pdf
PUBLIC FINANCE AND TAXATION COURSE-1-4.pdfPUBLIC FINANCE AND TAXATION COURSE-1-4.pdf
PUBLIC FINANCE AND TAXATION COURSE-1-4.pdf
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 

Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx

  • 1. Weeks1-2_MyLastName.doc/x Weeks 1-2 Written Assignment (submit here as single MS Word file) · Part 1 (refer to Week 1 Readings in the Lessons for Week 1 ) o Provide an aprox. 1000-word in-depth evaluation of three articles of your choice from the Week 1 Reading List. § What are the strengths and weaknesses of each? § What is the most and lest persuasive premise, claim or rebuttal? o Conclude with a research or policy question for further research o You must utilize literature and cite properly. Use style.APA · Part 2
  • 2. o ( Title each response with the text of each question) o Has U.S. federal government developed a robust legal, regulatory and policy framework to address cyber security challenges? Why? Why not? o Conclude with a research question or policy question for further research. o You must utilize APA (cite, reference, list) required Week 2 Readings . · Submit both Parts as single Microsoft Word document. · Name the file " EDMG600Weeks1-2_YourLastName.doc/x " (e.g., EDMG600Week1-2_Pesic.doc/x). · Upload the document under Weeks1-2 Assignments. Week 1 Reading and Resources Reading Assignment Choose and read
  • 3. three articles from the list bellow: Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft . International Security, Fall 2013. Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to earth . International Security, Fall 2013. Arquilla, J. (2012). Cyberwar is already upon us . Foreign Policy . March/April, 2012. Brown, G. & Poellet, K. (2012). The Customary International Law of Cyberspace . Strategic Studies Quarterly, 6, no. 3, pp. 126-145. Caplan, N. (2013). Cyber War: the Challenge to National Security . Global Security Studies , Winter 2013, Volume 4, Issue
  • 4. Studentnummer, L. van den Boom (2012). The dilemmas of state response to cyber attacks. Understanding the phenomena, challenges and legal response . Vrije Universiteit Amsterdam: Paper Governance of Security and Policing . Crosston, M. D. (2011). World Gone Cyber MAD: How 'Mutually Assured Debilitation' Is the Best Hope for Cyber Deterrence . Strategic Studies Quarterly, 5, no. 1, pp. 100-116. Goldsmith, J. (2011). Cybersecurity Treaties: A Skeptical View . A Future Challenges Essay. Hoover Institution. Mudrinich, E. (2012). Cyber 3.0: the Department of Defense strategy for operating in cyberspace and the attribution problem . Guinchard, A. (2011). Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy . Journal of Strategic Security Volume 4 Number 2 Summer 2011. Khosla, P. (2009). Information Security for the Next Century . Carnegie Mellon CyLab.
  • 5. Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School . International Studies Quarterly , 53(4), pp. 1155-1175. Kusiak, P. (2012). Culture, Identity, and Information Technology in the 21st Century: Implications for U.S. National Security . Carlisle Barracks: U.S. Army War College, Strategic Studies Institute. Libicki, M. C. (2012). Crisis and Escalation in Cyberspace . Santa Monica: RAND. Nye, J. (2011). Nuclear lessons for cyber security . Strategic Studies Quarterly . Winter 2011. Rid T. (2012). Think again: Cyberwar . Foreign Policy . March/April, 2012. Robinson, N., Gribbon, L., Horvath, V. & Robertson, K. (2013). Cyber-security threat characterisation: A rapid comparative analysis . RAND Europe. Schilling, J. R. (2010).
  • 6. Defining Our National Cyberspace Boundaries . Strategy Research Project. Carlisle Barracks: U.S. Army War College. Schneider, F. B. & Birman, K.B. (2009). The monoculture risk put into context . IEEE Security & Privacy . Schneider, F. & Mulligan, D. (2011). Doctrine for cybersecurity . Daedalus . Fall 2011, pp. 70-92. Steptoe Cyberblog (2012). The hackback debate . Nov. 2, 2012. Ahmad, R. & Yunos, Z (2012). The Application of Mixed Method in Developing a Cyber Terrorism Framework . Journal of Information Security , 2012, 3, pp. 209-214. Gourley, B. (2009). Open Source Software and Cyber Defense . A White Paper provided to the National Security Council and Homeland Security Council as input to the White House Review of Communications and Information Infrastructure. Cote, R. (2011). The Strategic Paradox of Social Networks
  • 7. . Strategy Research Project . Carlisle Barracks: U.S. Army War College. Week 2 Reading and Resources Week 2 Reading Assignment Required : Rollings, J. & Henning, A. C. (2009). Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations . Congressional Research Service. Required: Fischer, E. A. (2012). Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions . Washington, DC: U.S. Library of Congress, Congressional Research Service. Required : The White House (2011). The Comprehensive National Cybersecurity Initiative . Washington, D.C. Required: The White House (2011).
  • 8. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World . Washington, DC: The White House (please bepatient when downloading. It may take up to five minutes to download the document). Required : Department of Homeland Security (2011). Blueprint for a Secure Cyber Future . Electronic Frontier Foundation, To the White House Cyber Security Review Team . The White House (2009). Cyberspace Policy Review . The White House (2011). National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy . Washington, D.C. Federal Reserve Bank of Dallas (2003). Interagency Paper on Sound Practices to Strengthen the Resilience of the U.S. Financial System . United States. Government Accountability Office (GAO) (2011). Information security: Additional guidance needed to address cloud computing concerns . Internet Security Alliance (2008).
  • 9. The Cyber Security Social Contract Policy Recommendations for the Obama Administrations and 111th Congress . Owens, W. A., Dam, K. W. & Lin, H. S. (Eds.) (2009). Technology, policy, law, and ethics regarding U.S. acquisition and use of cyber attack capabilities . National Research Council. Committee on Offensive Information Warfare. The National Academies Press. Committee on Deterring Cyberattacks, National Research Council (2010). Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy . National Research Council (2009). Beyond 'Fortress America': National Security Controls on Science and Technology in a Globalized World . Brecht, L. A. (2009). National cyber systems infrastructure security review concept paper . Capital Markets Research. My last week assignment bellow:
  • 10. Conclude with a research or policy question for further research. Is cyberwar upon us and application of mixed method in developing a cyber terrorism framework . Reference http://file.scirp.org/Html/5-7800087_21342.htm https://www.thefreelibrary.com/_/print/PrintArticle.aspx?id=29 7309173 http://foreignpolicy.com/2012/02/27/cyberwar-is-already-upon- us/