Latest stories

  • in

    The European Union will set up a joint cybersecurity unit to combat cyber threats.

    Hot

    businessman pointing on eu flag hologram

    In response to the increasing frequency of cyber-attacks, the European Commission has presented a proposal for a new joint cybersecurity unit capable of a modern and coordinated response. The EU Commission has stressed that cyber-attacks are growing in scale and have a severe impact on the functioning of public services and individuals’ lives. Too often, […] More

  • in

    Cybersecurity mitigation spending has exceeded $150 billion this past year.

    team of cyber criminals hacking into the government server

    Cybersecurity mitigation spending has exceeded $150 billion this past year, which is the highest in history. There is a significant proportion of CIOs who have invested the time and money in making their company’s cybersecurity better this year! According to the latest forecast from market analyst firm Gartner, spending on information security technologies and services […] More

  • in

    Why Social Engineering is Still a Big Problem in 2021

    29322722 worried businessman sitting at desk with laptop

    Social engineering is one of the most commonly used methods of stealing information from individuals and businesses alike. This is a form of cyberattack that is usually difficult for a user to recognize because it mostly relies on human interaction rather than computer code. The most important thing to remember about this method of attack […] More

  • in ,

    Future Considerations

    Future Considerations

    Strategic Cybersecurity, Module 15: Future Considerations. This final lecture of the course “Strategic Cybersecurity” discusses topics for students to consider in the future. The module focuses on three primary concerns: the need for cybersecurity analysis to be interdisciplinary in nature, the adversarial realm that is concerned with destroying data due to perceived diplomatic slight, and […] More

  • in ,

    Critical Infrastructure

    Critical Infrastructure

    Strategic Cybersecurity, Module 14: Critical Infrastructure. The U.S. government’s approach to protecting critical infrastructure from physical and cyber attacks has evolved over the past half-century, with presidential administrations creating various entities to better protect the country’s infrastructure. This lecture discusses this history and discusses the creation of Information Sharing and Analysis Centers, or ISACs. The […] More

  • in ,

    Economics, Government Regulation, and Cybersecurity

    Economics Government Regulation and Cybersecurity.

    Strategic Cybersecurity, Module 13: Economics, Government Regulation, and Cybersecurity. Cybersecurity may be considered both a public and a private good, requiring cooperation and collaboration between the public and private sectors. This can be difficult, given the private sector’s typical suspicion of government assistance. This lecture discusses economics and government regulation in achieving cybersecurity. The Objectives […] More

  • in ,

    Privacy

    Privacy.

    Strategic Cybersecurity, Module 12: Privacy. This lecture discusses privacy concerns on the Internet. The module clarifies that concerns exist not just in the United States but also in the rest of the world. The Objectives Once you have completed the readings, lecture, activity, and assessment, you will be able to Describe the Internet of Things […] More

  • in ,

    Dataveillance

    The Concept of Dataveillance

    Strategic Cybersecurity, Module 11: The Concept of Dataveillance. This lecture discusses the concept of combining big data analysis with technical surveillance, or “dataveillance.” The module looks at two trends enabling the ability for dataveillance: nearly exponential increases in computer power and similar decreases in the cost of data storage. The Objective Once you have completed […] More

  • in ,

    Cyber Crime and the Law

    Cyber Crime and the Law 1

    Strategic Cybersecurity, Module 10: Cyber Crime and the Law. This lecture expands on the difficulty in determining computer intrusion attribution by discussing the challenges of constructing laws to deal with such criminal activity. The Objective Once you have completed the readings, lecture, activity, and assessment, you will be able to Describe why cybercrime investigations are […] More

  • in ,

    Problems of Identity and Attribution

    Problems of Identity and Attribution. 1

    Strategic Cybersecurity, Module 9: Problems of Identity and Attribution. This lecture discusses the problem of determining identity and attribution on the Internet. References are made to such events as “Ghost-Net” and Russia’s meddling in the 2016 U.S. presidential election via social media. The Objectives Once you have completed the readings, lecture, activity, and assessment you […] More

  • in ,

    Cyber Conflict and the Law

    Cyber Conflict and the Law

    Strategic Cybersecurity, Module 8: Cyber Conflict and the Law. Lecture 8 discusses problems that cyber technology poses for international law. In particular, the module focuses on two aspects of international law that deal with the question of armed conflict: Jus Ad Bellum, or “the right to wage war,” and Jus In Bello, or “justice in […] More

Load More
Congratulations. You've reached the end of the internet.