Weeks1-2_MyLastName.doc/x
Weeks 1-2 Written Assignment (submit here as single MS Word file)
#button {
background-color: #F05A1A;
border: 5px;
border-radius: 5px;
color: white;
padding: 5px 5px;
text-align: center;
text-decoration: none;
display: inline-block;
font-size: 13px;
margin: 4px 2px;
cursor: pointer;
}
Save your time – order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines
Order Paper Now
· Part 1 (refer to Week 1 Readings in the Lessons for Week 1)
o Provide an aprox. 1000-word in-depth evaluation of three articles of your choice from the Week 1 Reading List.
§ What are the strengths and weaknesses of each?
§ What is the most and lest persuasive premise, claim or rebuttal?
o Conclude with a research or policy question for further research
o You must utilize literature and cite properly. Use style.APA
· Part 2
o (Title each response with the text of each question)
o Has U.S. federal government developed a robust legal, regulatory and policy framework to address cyber security challenges? Why? Why not?
o Conclude with a research question or policy question for further research.
o You must utilize APA (cite, reference, list) required Week 2 Readings.
· Submit both Parts as single Microsoft Word document.
· Name the file “EDMG600Weeks1-2_YourLastName.doc/x” (e.g., EDMG600Week1-2_Pesic.doc/x).
· Upload the document under Weeks1-2 Assignments.
Week 1Reading and Resources
Reading Assignment
Choose and read three articles from the list bellow:
Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft. International Security, Fall 2013.
Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to earth. International Security, Fall 2013.
Arquilla, J. (2012). Cyberwar is already upon us. Foreign Policy. March/April, 2012.
Brown, G. & Poellet, K. (2012). The Customary International Law of Cyberspace. Strategic Studies Quarterly, 6, no. 3, pp. 126-145.
Caplan, N. (2013). Cyber War: the Challenge to National Security. Global Security Studies, Winter 2013, Volume 4, Issue
Studentnummer, L. van den Boom (2012). The dilemmas of state response to cyber attacks. Understanding the phenomena, challenges and legal response. Vrije Universiteit Amsterdam: Paper Governance of Security and Policing.
Crosston, M. D. (2011). World Gone Cyber MAD: How ‘Mutually Assured Debilitation’ Is the Best Hope for Cyber Deterrence. Strategic Studies Quarterly, 5, no. 1, pp. 100-116.
Goldsmith, J. (2011). Cybersecurity Treaties: A Skeptical View. A Future Challenges Essay. Hoover Institution.
Mudrinich, E. (2012). Cyber 3.0: the Department of Defense strategy for operating in cyberspace and the attribution problem.
Guinchard, A. (2011). Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy. Journal of Strategic Security Volume 4 Number 2 Summer 2011.
Khosla, P. (2009). Information Security for the Next Century. Carnegie Mellon CyLab.
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), pp. 1155-1175.
Kusiak, P. (2012). Culture, Identity, and Information Technology in the 21st Century: Implications for U.S. National Security. Carlisle Barracks: U.S. Army War College, Strategic Studies Institute.
Libicki, M. C. (2012). Crisis and Escalation in Cyberspace. Santa Monica: RAND.
Nye, J. (2011). Nuclear lessons for cyber security. Strategic Studies Quarterly. Winter 2011.
Rid T. (2012). Think again: Cyberwar. Foreign Policy. March/April, 2012.
Robinson, N., Gribbon, L., Horvath, V. & Robertson, K. (2013). Cyber-security threat characterisation: A rapid comparative analysis. RAND Europe.
Schilling, J. R. (2010). Defining Our National Cyberspace Boundaries. Strategy Research Project. Carlisle Barracks: U.S. Army War College.
Schneider, F. B. & Birman, K.B. (2009). The monoculture risk put into context. IEEE Security & Privacy.
Schneider, F. & Mulligan, D. (2011). Doctrine for cybersecurity. Daedalus. Fall 2011, pp. 70-92.
Steptoe Cyberblog (2012). The hackback debate. Nov. 2, 2012.
Ahmad, R. & Yunos, Z (2012). The Application of Mixed Method in Developing a Cyber Terrorism Framework. Journal of Information Security, 2012, 3, pp. 209-214.
Gourley, B. (2009). Open Source Software and Cyber Defense. A White Paper provided to the National Security Council and Homeland Security Council as input to the White House Review of Communications and Information Infrastructure.
Cote, R. (2011). The Strategic Paradox of Social Networks. Strategy Research Project. Carlisle Barracks: U.S. Army War College.
Week 2Reading and Resources
Week 2 Reading Assignment
Required: Rollings, J. & Henning, A. C. (2009). Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations. Congressional Research Service.
Required: Fischer, E. A. (2012). Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions. Washington, DC: U.S. Library of Congress, Congressional Research Service.
Required: The White House (2011).The Comprehensive National Cybersecurity Initiative. Washington, D.C.
Required: The White House (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Washington, DC: The White House (please bepatient when downloading. It may take up to five minutes to download the document).
Required: Department of Homeland Security (2011). Blueprint for a Secure Cyber Future.
Electronic Frontier Foundation, To the White House Cyber Security Review Team.
The White House (2009). Cyberspace Policy Review.
The White House (2011). National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy. Washington, D.C.
Federal Reserve Bank of Dallas (2003). Interagency Paper on Sound Practices to Strengthen the Resilience of the U.S. Financial System.
United States. Government Accountability Office (GAO) (2011). Information security: Additional guidance needed to address cloud computing concerns.
Internet Security Alliance (2008). The Cyber Security Social Contract Policy Recommendations for the Obama Administrations and 111th Congress.
Owens, W. A., Dam, K. W. & Lin, H. S. (Eds.) (2009). Technology, policy, law, and ethics regarding U.S. acquisition and use of cyber attack capabilities. National Research Council. Committee on Offensive Information Warfare. The National Academies Press.
Committee on Deterring Cyberattacks, National Research Council (2010). Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy.
National Research Council (2009). Beyond ‘Fortress America’: National Security Controls on Science and Technology in a Globalized World.
Brecht, L. A. (2009). National cyber systems infrastructure security review concept paper. Capital Markets Research.
My last week assignment bellow:
Conclude with a research or policy question for further research.
Is cyberwar upon us and application of mixed method in developing a cyber terrorism framework .
Reference
http://file.scirp.org/Html/5-7800087_21342.htm
https://www.thefreelibrary.com/_/print/PrintArticle.aspx?id=297309173