PADM 6950/4950 A – Cyber Security Policy

Augusta University

Spring 2017

Class Time and Location

Meets on Tuesdays at 6:00-8:45 p.m. in Allgood Hall E 157

Instructor:John J. Heslen, PhD.

Email:

Phone:706-729-2772

Office Hours:Monday &Wednesday 3:00 to 5:00 and Thursday, 2:00 to 4:00 p.m. in University Hall UH 106

Course Description

This course introduces students to the geo-political, economic and social issues that inform public policy decisions with regard to cybersecurity.

The fascinating world of strategic cyber security covers topics as diverse as cyber war, hacktivism, big data, cyber-crime and threats to critical infrastructure. We will also discuss common vulnerabilities of the internet, as well as legal and ethical concerns relating to issues of privacy and government surveillance of the internet.

Learning Outcomes

This course is designed as a “non-technical” introduction to cybersecurity policy. At the end of this course, students should be able to better conceptualize the nature of state and non-state cyber threats and better frame strategies for addressing them.

By the end of the course, students will be able to:

1)Understand the general vulnerabilities associated with the internet and how many of these vulnerabilities result from the interconnected nature of its design.

2)Understand the differences in motivations between nation-state and non-state actors (to include hacktivists, criminals and terrorist groups) in cyberspace.

3)Describe some of the common threats to privacy and civil liberties created by the internet and the development of “Big Data,” as well as how the Constitution may protect (or limit) our rights.

4)Describe the various forms cyber-crime can take on the internet, and the mitigating measures individuals can use to protect themselves from it.

5)Describe how the growth and development of the “Internet of Things,” will create both challenges and benefits for society.

Required Materials and Other Resources

For this course, there are two required textbooks:

  1. Rosenzweig, P. (2013). Cyber Warfare, ISBN: 978-0-313-39895-7 (Referred to as “Rosenzweig” in the course outline)
  1. Singer, P and Friedman, A. (2014).Cybersecurity and Cyberwar: What Everyone Needs to Know. ISBN: 978-0-19-991811-9 (Referred to as “Singer and Friedman” in the course outline)

Grading

1st Paper20%

1st Presentation 5%

2nd Paper 20%

2nd Presentation5%

Quiz 1 10%

Quiz 2 10%

Final Exam 20%

Participation10%

Total100%

*****A= 90 - 100; B= 80 – 89; C= 70 - 79; D= 60 – 69; and F= 0 – 59

  1. The two required papers will be 3-4 pages (double-spaced, Times New Roman) covering cyber-related topics the students will receive the first day of class. Students must use APA citation style guidelines and the title page and references will not count toward the required page length.
  2. Students will present their papers to the class utilizing power point. The power point presentation should include a title slide and an agenda slide and the presentations should be approximately 10- 12 minutes in duration.
  3. The two quizzes will consist of multiple choice, essay and short answer questions covering the material addressed in the readings, class lectures and discussions. The second quiz will not be cumulative.
  4. The final exam is cumulative and will consists of multiple choice, essay and short answer questions covering the material addressed in the readings, class lectures and discussions.
  5. Participation (10%): A large part of this course will be treated as a seminar where cyber-relatedpolicy issues are discussed by the whole class with the instructor serving as a facilitator. All students are expected to actively participate in the course discussions.

Teaching Methods

I’m a strong believer in facilitating the development of team-building and presentation skills. To accomplish this, I will require students to organize and present their papers (via power point) to the class. Additionally, during most classes I will divide the class into groups, and ask each group to read and present acybersecurity-related article.

Attendance and Participation

Attendance at all class meetings is required. The final exam is based heavily on material covered in class.If students accumulate more than two absences, it will be difficult to do well in the course.

For each class meeting, students will be required to turn in one multiple choice and one short answer question they developed based on the week’s readings. The student’s participation grade will be based these questions as well as classroom participation in discussions.

Late/Incomplete Work

All assignments must be turned in by their due date and time. If a student turns in work late, 5% of the assignment’s total grade will be deducted for every day that the work is late.

Withdrawal Policy

If necessary, students are responsible for withdrawing themselves from the course. If a student fails to withdraw from the course before the final withdrawal date, the student runs the risk of failing the course.

Technology in the Classroom

I encourage you to use technology that contributes to your learning experience. However, if you use technology for purposes not related to the course, such as Facebook, then technology becomes a distraction to you but also your classmates and me. Also, make sure your cell phones are on silent and are not on your desk, unless you have permission from me.

Academic Honesty

The university regulations regarding academic dishonesty including (but not limited to) cheating, plagiarism, and credential misrepresentation will be strictly enforced. Plagiarism includes but not limited to the presentation of ideas, words, techniques, etc. of someone without properly acknowledging the source. Further information on academic dishonesty and the penalties that go with it is available from the GRU Catalog under Student Rights and Responsibilities.

Accommodations for Disabilities

Students with any form of physical, emotional, and/or learning impairments requiring accommodation should please inform the instructor and contact the Testing and Disability Services at 706-737-1469 (the TTY number is 706-667-4684) immediately.

E-mail/Office Visits

Students should check their university emails and the course’s D2L site on a regular basis. E-mail is often the best way to contact me. I will respond to your email within 48 hours of when you sent it. If I have not responded within this time, please email me again. While e-mail is convenient, do not hesitate to visit my office.

Other Course Policies

All other aspects of this course will follow the Pamplin Course Policies posted online at this URL: Please read them carefully, as they include important information about Academic Honesty, Disruptive Behavior, and Accommodations for Disabilities, Withdrawals, and other topics. By remaining in this course, you agree to abide by these policies.

Schedule

The following schedule is subject to change, but provides a fairly reliable indication of the pace, assignments, and major deadlines that you will need to plan for this semester.

Dates / Topics / Readings & Assignments
1/10 / Introduction to cybersecurity policy / Rosenzweig, Chapter 1
Singer & Friedman, p 12 -26; p 55-66
Part I: Understanding the Scope of Cybersecurity Policy
1/17 / Understanding common vulnerabilities in cyberspace / Rosenzweig, Chapter 2
Singer & Friedman, p 34 - 45
1/24 / Cyber Conflict and Insurgency / Rosenzweig, Chapter 3 and Chapter 5
Singer & Friedman, p 120 – 133; p 55 - 60
1/31 / Cyber Conflict: The Law and Constitution / Rosenzweig, Chapter 4 and Chapter 8
Part II: Cyber Crime, Surveillance and Privacy
2/7 / Problems of Identity and Attribution / Rosenzweig, Chapter 6
Singer & Friedman:
-“On the internet: How Do They Know Whether You are a Dog? Identity and Authentication, p 31 – 34
-“How Do We Trust in Cyberspace? P 45 – 51
-“Whodunit? The Problem of Attribution.” P 72 -77
2/14 / Understanding Cyber Crime / Rosenzweig, Chapter 7
Singer & Friedman, p 77 -91
Quiz 1
2/21 / Student Presentations / 1stPaper Due!
Students will present a 10-12 minute overview of their papers to the class.
2/28 / Understanding problems of
Surveillance in Cyberspace / Rosenzweig, Chapter 9 and Chapter 12
3/7 / Issues of Privacy in Cyberspace / Rosenzweig, Chapter 10, Chapter 11
Part III: Regulatory Policies
3/14 / Economics of Cybersecurity / Rosenzweig, Chapter 13 and Chapter 14
3/21 / Government Regulation of Cyberspace / Rosenzweig, Chapter 15 and Chapter 17
3/28 / Cyber-terrorism and Critical Infrastructure / Rosenzweig: Chapter 16
Singer & Friedman: p 85 – 106
Quiz 2
Spring Break 4/3-4/7
4/11 / International Regulation of Cyberspace / Rosenzweig, Chapter 19
Singer & Friedman: p 177 - 197
4/18 / Student Presentations! / Papers due!
4/25 / Future Considerations/ Exam Preparation / Rosenzweig, Chap 20
Singer & Friedman: p 247 - 257

Other important dates:

January 10th is the first day of classes

January 16th is Martin Luther King, Jr. Holiday

March 3rd is the semester midterm date and the last day to drop the course without academic penalty

April 25th is the final day of classes

1