Class 1: Introduction and Governance
Don’t forget to read WP and WSJ Cyber M-F Email
National Cybersecurity Strategy (https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf)
Class 2: International Law
Don’t forget to read WP and WSJ Cyber M-F Email
Declaration of the Rights of Cyberspace (https://www.eff.org/cyberspace-independence)
Law of the Horse (https://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=2147&context=journal_articles)
Lessig, Code, Chapter One, and pp. 121-125 (available on the internet)
Class 3: Operations and International Law, pp. 1-14,
“Does International Law Matter in Cyberspace?” (If not available, I will lecture on it.)
Deibert, pp. 1-29, 112-133
Class 4: Historical Background
Don’t forget to read WP and WSJ Cyber M-F Email
Deibert, pp. 29-69
Class 5: Case Studies
Don’t forget to read WP and WSJ Cyber M-F Email
Fancy Bear, Introduction, Chapters One and Two
Class 6: Case Studies
Don’t forget to read WP and WSJ Cyber M-F Email
Fancy Bear, Chapters Three and Four
Class 7: Case Studies
Don’t forget to read WP and WSJ Cyber M-F Email
Fancy Bear, Chapters Five and Six
Class 8: Case Studies
Don’t forget to read WP and WSJ Cyber M-F Email
Fancy Bear, Chapters Seven and Eight
Class 9: Case Studies
Don’t forget to read WP and WSJ Cyber M-F Email
Fancy Bear, Chapter Nine and Ten, Conclusion and Epilogue
Class 10: Privacy and Information Security Policy
Don’t forget to read WP and WSJ Cyber M-F Email
Solove and Hartzog, Breached! Part I
Class 11: Privacy and Information Security Policy
Don’t forget to read WP and WSJ Cyber M-F Email
Solove and Hartzog, Breached Part II, pp. 65-128
Class 12: Privacy and Information Security Policy
Don’t forget to read WP and WSJ Cyber M-F Email
Solove and Hartzog, Breached, Part II, pp. 128-198
Class 13: Privacy and Information Security
Don’t forget to read WP and WSJ Cyber M-F Email
Review of Cornell University Information Technology Policy
Deibert, 112-133, 195-217
Class 14: Contemporary Landscape of Cybersecurity
Don’t forget to read WP and WSJ Cyber M-F Email
Fifth Domain, Part I
Class 15: Contemporary Landscape of Cybersecurity: Corporations
Don’t forget to read WP and WSJ Cyber M-F Email
Fifth Domain, Part II
Class 16: Course Preparation for Debate
Don’t forget to read WP and WSJ Cyber M-F Email
Topic and Materials TBA
Class 17: Class Debate
Class 18: Contemporary Landscape of Cybersecurity: Government and Military
Don’t forget to read WP and WSJ Cyber M-F Email
Fifth Domain, Part III and IV
Class 19: Contemporary Landscape of Cybersecurity: International
Don’t forget to read WP and WSJ Cyber M-F Email
Fifth Domain, Part V and VI
Class 20: What Dreams May Come
Don’t forget to read WP and WSJ Cyber M-F Email
Deibert, 232-245
Declaration for the Future of the Internet (https://www.state.gov/declaration-for-the-future-of-the-internet)
Final Paper
A Final Paper will be due in Moodle on the date and time of the Final Exam Schedule for this course. The Final Paper should not be more than three (5) pages, 1-inch margins, 1.5 spacing, 12-point regular Times New Roman type. It will be a synthetic rendering of what you have learned in the course based on a prompt you will be provided at the end of the semester. The best way to prepare for it is to maintain consistent attention to class, readings, lectures, etc. and take note of the connections in the materials in the course to reach a larger understanding of the politics, policy, and law of cybersecurity.
|