国际网络冲突

International Cyber Conflicts

1425 次查看
纽约州立大学纽约州立大学
Coursera
  • 完成时间大约为 8 个小时
  • 混合难度
  • 英语
注:本课程由Coursera和Linkshare共同提供,因开课平台的各种因素变化,以上开课日期仅供参考

课程概况

By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare. Management of cyber incidents and conflicts requires an interdisciplinary perspective including an understanding of: 1) characteristics of the cyber threats and conflicts themselves, 2) international efforts to reduce and improve cyber security, and 3) psychological and sociopolitical factors.

The course is designed to reach an international audience and will encourage discussion on relevant current events among participants to enrich the experience with various personal and cultural perspectives on cutting-edge issues. In addition, assignments and other assessments will supplement video lectures and selected readings to ensure application of the material.

After taking this course you will be able to:

• Identify different types of actors involved in cyber threats (individuals, organizations & nation-states)
• Distinguish between different types of threats and issues in cyber security including, data theft, political espionage, critical infrastructure protection, and propaganda
• Detail the basic characteristics of the Internet infrastructure and international efforts to address Internet governance
• List several international efforts to address cyber crime and espionage
• Evaluate how principals that govern international conflicts might be applied in context of cyber security
• Apply different psychological theories of human motivation and cooperation and communication and political theories in analysis of different international issues related to cyber security including censorship, media operations and role of social technologies.

Grading:

Your grade is assessed based on discussion posts and quizzes. Individual taking this course for credit (i.e. students at the University at Albany y will be required to engage in additional activities communicated to them directly).

Recommended Background:

No background knowledge or skills are necessary, but an understanding and familiarity of cyber security, Internet infrastructure and international law would be advantageous for anyone who participates in the course.

ACKNOWLEDGEMENTS

Ersin Dincelli and Nic DePaula were the instructional designers for the course who assisted in the recording of the videos, reviewing material, creating slides, assessments and some of the content. Without their tremendous effort this would not have been possible. We also acknowledge the financial support for the recordings from the University at Albany as well as the support from Media and Marketing. Finally, thanks to Lisa Stephens who is the SUNY liaison to Coursera for being a strong supporter of the MOOC.

课程大纲

Introduction to Cybercrime

This module is intended to introduce you to a set of actors and motivations in the area of cyber security. After this module you will be able to identify the different threat actors and the different types of cybercrime. You will also be able to provide some preliminary analysis of cybercrime by understanding basic psychological mechanisms of motivation.

Internet Governance

This module covers technical aspects of the Internet and the domain name system, and efforts toward internet governance. After this module you should be able to define main components of the Internet infrastructure, identify the main issues in governance and compare different approaches to international internet policy.

Cyberwarfare and International Conflicts

In this module we cover the main types of attacks, actors and conflicts that may be considered aspects of cyberwarfare. After this module you will recognize the different types of cyber threats and the modes of attacks and discuss the motivations of state and non-state actors in this domain.

Cyberwarfare and International Law

This modules covers political theories and legal arrangements pertinent to cyber security. After this module you will be able to describe principles of just war, basic aspects of International Humanitarian Law and treaties. You will be able to evaluate the particularities of dealing with states and non-state actors and the potential international solutions.

Interpersonal Trust and Trust among Nations

This module deals more specifically with psychological explanations for individual trust and trust among nations. After this module you will be able to explain how people react in situations of giving and of trust. You will also be able to identify and discuss how confidence building measures may be applied in the domain of cyber security.

千万首歌曲。全无广告干扰。
此外,您还能在所有设备上欣赏您的整个音乐资料库。免费畅听 3 个月,之后每月只需 ¥10.00。
Apple 广告
声明:MOOC中国十分重视知识产权问题,我们发布之课程均源自下列机构,版权均归其所有,本站仅作报道收录并尊重其著作权益。感谢他们对MOOC事业做出的贡献!
  • Coursera
  • edX
  • OpenLearning
  • FutureLearn
  • iversity
  • Udacity
  • NovoEd
  • Canvas
  • Open2Study
  • Google
  • ewant
  • FUN
  • IOC-Athlete-MOOC
  • World-Science-U
  • Codecademy
  • CourseSites
  • opencourseworld
  • ShareCourse
  • gacco
  • MiriadaX
  • JANUX
  • openhpi
  • Stanford-Open-Edx
  • 网易云课堂
  • 中国大学MOOC
  • 学堂在线
  • 顶你学堂
  • 华文慕课
  • 好大学在线CnMooc
  • (部分课程由Coursera、Udemy、Linkshare共同提供)

© 2008-2022 CMOOC.COM 慕课改变你,你改变世界