DIP 600: Cybersecurity
Patterson School of Diplomacy and International Commerce
420 Patterson Office Tower
Dr. Robert M. Farley
Office: POT 1177
Office Hours: Wednesday, 9am-11am
Office Telephone: 859-257-4668
This course seeks to familiarize students with the basic concepts associated with cyber-space, cyber-security, and cyber-conflict. We will work through the history of the internet, the political problems that the digitization of knowledge poses, and the implications that these political problems have for international politics. Students will develop projects associated with the practical, organizational implications of cyber-security in the United States.
The course primarily revolves around class discussion, with some interactive lecture. Students are expected to come prepared to discuss readings, as well as to have familiarity with current events in the area of cyber-conflict and cyber-security.
Student Learning Outcomes*:
After completing the course, students should have the capacity to:
*Courtesy of Frakes, EKU HLS 341
Students with Disabilities
If you have a documented disability that requires academic accommodations, please see me as soon as possible during scheduled office hours. In order to receive accommodations in this course, you must provide me with a Letter of Accommodation from the Disability Resource Center (2 Alumni Gym, 257-2754, email address email@example.com) for coordination of campus disability services available to students with disabilities.
You must inform me in writing if you know in advance that you will miss an exam due to an excused reason such as: illness, serious illness or death in your immediate family, a University-sanctioned field trip, or religious holiday. Excuses for missed exams will be granted as per University policy.
Per university policy, students shall not plagiarize, cheat, or falsify or misuse academic records. Students are expected to adhere to University policy on cheating and plagiarism in all courses. The minimum penalty for a first offense is a zero on the assignment on which the offense occurred. If the offense is considered severe or the student has other academic offenses on their record, more serious penalties, up to suspension from the university may be imposed.
Plagiarism and cheating are serious breaches of academic conduct. Each student is advised to become familiar with the various forms of academic dishonesty as explained in the Code of Student Rights and Responsibilities. Complete information can be found at the following website: http://www.uky.edu/Ombud. A plea of ignorance is not acceptable as a defense against the charge of academic dishonesty. It is important that you review this information as all ideas borrowed from others need to be properly credited.
Plagiarism includes reproducing someone else’s work, whether it be a published article, chapter of a book, a paper from a friend or some file, or something similar to this. Plagiarism also includes the practice of employing or allowing another person to alter or revise the work which a student submits as his/her own, whoever that other person may be. Students may discuss assignments among themselves or with an instructor or tutor, but when the actual work is done, it must be done by the student, and the student alone. However, nothing in these Rules shall apply to those ideas which are so generally and freely circulated as to be a part of the public domain (Section 6.3.1).
Grading will be based on class participation (15%), two 7-9 page analytical papers (25% each), and one class project (35%).
Each of the two 7-9 page analytical papers must be typed and double-spaced. Please do not exceed the page limit. Although specific topic is up to you, one paper should have an institutional or regional focus, while the other should concentrate on a particular nation-state (not necessarily a country studied in the course). The papers need not hold to any particular format (policy oriented memo, for example), but should be internally consistent in focus. Additional research is welcome, and may be necessary for the adequate presentation of some topics. The first paper is due on April 1, and the second on the final day of the course. The papers will be evaluated on both content and presentation. Information must be accurate, arguments must be well thought out, and style must be compelling. The memos must conform to standards of academic citation (system of your choice).
Class participation includes active discussion of the week’s reading material, as well as the development of discussion questions 1-2 times during the course. You are expected to demonstrate engagement and familiarity with the subject matter in question.
The class project involves the development of a poster session for the Bluegrass Intelligence Colloquium, April 1, 2016 at William T. Young Library. You will revise and revisit this project for a paper and presentation on the final day of the course. The project should involve policy-oriented proposals for managing significant problems in cybersecurity. Details pending.
Purchase of the following books is recommended, but not required. These texts are best acquired through Amazon or similar service. Edition is irrelevant.
P.W. Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford: Oxofrd University Press, 2014.
Kevin Poulsen, Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground. New York: Crown, 2011.
Brandon Valeriano and Ryan Maness, Cyber War versus Cyber Realities: Cyber Conflict in the International System. Oxford: Oxford University Press, 2015.
Most of the rest of the class readings are available online. A few will be available through photocopies. Note that many of the online readings are available on JSTOR or other secure databases, which requires either a University computer or a properly configured connection.
Week 1: January 14 What is Cyberspace?
Week 2: January 21 What is Cybersecurity?
Week 3: January 28 Basic tools of Cyberwarfare
Week 4: February 4 Cyberwarfare and International Politics
Week 5: February 11 Cybercrime
Week 6: February 18 Cybersecurity and Law Enforcement
Week 7: February 25 Cyber Terror
Week 8: March 3 Organizational Response
Week 9: March 10 Cybersecurity and the Private Sector
Week 10: March 24 Law of Cyberspace
Week 11: March 31 No Class: Bluegrass Intelligence Colloquium
Prepare Poster Presentation
Week 12: April 7 US-China Relationship
Benjamin Wittes, “James Lewis on the Cyber Deal,” Lawfare (also listen to podcast)
Week 13: April 14 US Cyber-Strategy
Week 14: April 21: Future Trends
Week 15: April 28: Presentations Revisited