Sunteți pe pagina 1din 8

Syllabus CYBR 622 Global Cyber Capabilities & Trends Instructor Contact Information/Hours of Availability

Albert Kinney Department of Computer Science and Electrical Engineering University of Maryland Baltimore County E-mail: alkinney@umbc.edu

Course Prerequisites
CYBR 620: Introduction to Cybersecurity. Students should have a conversational understanding of basic computer and network communications protocols, vulnerabilities, and security mechanisms.

Course Description
CYBR 622 will provide an overview of cyber capabilities and trends in the global community including both nationstates as well as non-state actors. This course involves review and research of stated, discovered, or assessed cybersecurity capabilities, strategies, and policies across the global community. As information is available, the course will perform comparative analysis of international cybersecurity policies along with capability maturity assessments. The course will culminate in a cybersecurity policy exercise where students will develop further insight to the implications of various courses of action in the context of a dynamic global cybersecurity environment.

Course Learning Objectives


By the completion of this course, the student should be able to: Describe the complexities of the global cybersecurity environment Compare and contrast cybersecurity policies and strategies between various nations Identify the missions, authorities, and responsibilities of key cybersecurity organizations within the international community Describe the offensive cyber capabilities purported to exist in the international community Apply the theory of cyber deterrence in developing future cybersecurity strategies and policies Analyze policy and strategy implications for prominent international cybersecurity case studies Identify emerging international trends in offensive and defensive cybersecurity practices

Course Textbooks
REQUIRED Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Jason Andress (Author), Steve Winterfeld (Author) Paperback: 320 pages Publisher: Syngress; 1 edition (June 1, 2011) ISBN-10: 1597496375 ISBN-13: 978-1597496377

REQUIRED Mapping Security: The Corporate Security Sourcebook for Today's Global Economy Tom Patterson (Author), Scott Gleeson Blue (Author) Paperback: 432 pages Publisher: Addison-Wesley Professional; 1 edition (December 24, 2004) ISBN-10: 0321304527 ISBN-13: 978-0321304520 *********** Various readings from current periodicals and government publications

Course Format
The course will be a combination of lecture, classroom discussions, and student-led presentations. This course is formatted for a normal semester. Sessions are nominally 2:45 hours in length and scheduled once per week.

Course Requirements
Course Grading Scale
Course work Classroom & Online Leadership Mid-Term Exam Research Paper Final Exam Grade distribution 20 % 30 % 20 % 30 %

Final grade will computed as follows: 90%-100% 80%-89% 70%-79% 60%-69% <60% A B C D F

Assignments

CLASSROOM & ONLINE LEADERSHIP - CURRENT EVENT PRESENTATIONS AND DISCUSSIONS Because the UMBC Cybersecurity Strategy & Policy program aims to develop leaders to fill critical industry and government roles, portions of this course will provide opportunities for students to actively engage one another on relevant issues of the day. In addition to engaging the class in through both in-person and virtual means, each student will present one individual-effort discussion devoted to exposure of a current global cybersecurity issue, event, or technology based upon their reading of current news and periodical sources. This brief presentation shall be structured to communicate the most important aspects of the material within a 5-7 minute timeframe. Media resources (i.e. PowerPoint) shall NOT be used during this presentation it is simply a speech communication. Students shall communicate a concise and balanced summary of the material. The highest-scoring presentations will include a provocative set of questions related to the topic, thereby allowing classmates to engage the issue through debate and commentary. The most successful presenters will: quickly identify the most essential information about their topic concisely organize information enabling others to promptly grasp fundamental concepts efficiently research opposing technology, management, and business trends brainstorm effective methods to draw out classroom discussion and develop dialogue on meaningful issues Presentations will occur at the beginning of each class period with several students being heard during each meeting. Dates for individual presentations will be assigned by the instructor.

CYBER POWER FRAMEWORK ANALYSIS - GROUP RESEARCH PAPER (w/Individual Accountability) Each group shall conduct a significant scholarly investigation and produce an in-depth, postgraduate-level Cyber Power Framework Analysis paper expressing their perspective in a minimum of 20 pages and maximum 30 pages covering only the main body of the paper. See below for additional administrative details. The CYBR 622 Cyber Power Framework Analysis paper will be a thoughtful, well-researched, and accuratelyreferenced document exploring a framework of cybersecurity topics as they pertain to a specific country, region, or defined grouping of international sovereigns. The specific framework outline will be provided by the instructor during the first classroom session. All groups shall follow the same outline. Groups will consist of 4 or more individuals randomly selected by the instructor. The team will assign sections of the paper to individual authors during the first 2 weeks of the course. Group collaboration is encouraged especially concerning aspects related to smoothing the final document into a cohesive study (grammar, format, tone, active/passive voice). However, each author will be graded on their assigned portion of the paper. NOTE The Cyber Power Framework Analysis paper will contain information about each portion of the given framework, but the paper will NOT contain an introduction or a concluding analysis. Instead, each student will write an individual conclusion to the paper, which will serve as their Final Exam. The research paper shall adhere to the following format: 1) 2) 3) 4) Cover/Title Page (1 page) Table of Contents (1 page) Body of the paper (min 20 pages, max 30 pages) Bibliography MLA standard (pages as required)

5) Appendices not required, but should be used when significant graphics, tables, or quoted material would disrupt the flow of the main paper (pages as required). 6) Arial or Times New Roman 12-point font, single spaced 7) 1 Margins on all sides of the page 8) Justified alignment of paragraphs **Each team shall submit a FINAL VERSION of their RESEARCH PAPER to the instructor via hard copy AND e-mail on or before the due date indicated in the syllabus.** EXPECTATION: This paper will be completed on time. This paper will be written to postgraduate-level standards with regard to fundamental mechanics and thorough analysis. **Each team shall submit and present a 15-minute Powerpoint presentation to the class covering their Cyber Power Framework Analysis paper.

MID-TERM EXAMINATION The Mid-Term Examination shall adhere to the following writing formats: 1) Concise answers to questions, 1 question per page 2) Arial or Times New Roman 12-point font, single spaced 3) 1 Margins on all sides of the page 4) Justified alignment of paragraphs 5) Bibliography as needed MLA standard Each student shall participate in the scheduled Mid-Term Examination for this course. The examination will be conducted outside the classroom and will primarily consist of essay questions related to material covered to that point in the course. Students can expect test questions addressing open-ended issues that may have several potential correct solutions. Students may reference other materials in preparing their exam, but may not collaborate with another UMBC student accordingly, all materials should be properly referenced. EXPECTATION: An answer to any essay question should not require more than 1 page of writing. The primary measure of success will center on how well the student demonstrates critical thinking skills in a concise and focused response to the question, regardless of whether the professor agrees or disagrees with the students technical answer.

FINAL EXAMINATION The Final Examination shall adhere to the following writing formats: 1) Concise answers to questions, 1 question per page 2) Arial or Times New Roman 12-point font, single spaced 3) 1 Margins on all sides of the page 4) Justified alignment of paragraphs 5) Bibliography as needed MLA standard Each student shall participate in the scheduled Final Examination for this course. The examination will be conducted outside the classroom and will consist of each individual student writing a Risk Profile Conclusion based upon their Group Research Paper. The Risk Profile Conclusion shall contain the following sections: 1) Business Risk an assessment of the overall cyber risk of conducting business in that country or region 2) Crime/Terror Risk an assessment of the overall risk of that country or region harboring cyber crime/terrorism 3) Global Supply Chain Risk an assessment of the overall cyber supply chain risk from that country or region 4) Cyber War Risk an assessment of the overall risk of that country or region initiating a cyber war

5) Espionage Risk an assessment of the overall risk to global government & business intellectual property from that country or region Students may reference other materials in preparing their exam, but may not collaborate with another UMBC student accordingly, all materials should be properly referenced. EXPECTATION: Each section of the Risk Profile Conclusion should require 1-2 pages of writing. The primary measure of success will center on how well the student demonstrates critical thinking skills in a concise and focused response to the question, regardless of whether the professor agrees or disagrees with the students technical answer.

Course Policies
Course Work
Fourth-year college student writing is the minimum acceptable quality for course deliverables. Failure to complete the required in-class presentation results in the loss of the entire associated grade. Late assignments are not accepted unless an extension is preapproved by the instructor. There are no provisions for extra credit in this course.

Writing and Research


Effective writing is critical to the intellectual life of university students and graduates within the workplace. Effective managers are usually effective communicators. Your work in this course must demonstrate your ability to master and effectively communicate course content. Effective writing Meets the needs of the reader Adequately covers the subject Uses expected conventions of format and organizations Demonstrates use of credible reasoning and evidence Satisfies standards of style and grammatical correctness Requires 100% compliance with UMBC's zero-tolerance policy regarding plagiarism.

Academic Integrity
By enrolling is this course, each student assumes the responsibilities of an active participant in UMBCs scholarly community in which everyones academic work and behavior and held to the highest standards of honesty. Cheating, fabrication, plagiarism, and helping others to commit these acts are all forms of academic dishonesty, and they are wrong. Academic misconduct could result in disciplinary action that may include, but is not limited to, suspension or dismissal. To find useful information about avoiding plagiarism infractions through appropriate citations, or to read the full policy regarding student academic misconduct for the graduate school, please see http://www.umbc.edu/provost/integrity.

Course Weekly Schedule (15 scheduled meetings, 1 holiday)


Meeting 1 Feb 1 F2F Topic Required Reading

CYBR 622 Introduction Framework for International Patterson - Forward, Ch 2, Ch 3 Capabilities Assessments

2 Planning & Research Assignments Feb 8 Mapping Security Index STUDENTS ONLY Competition Between Sovereign States

Patterson Ch 8, CH 18

Winterfeld Ch 1, Ch 2

3 Feb 15 F2F *** ***

Internet Governance Internet Governernce in an Age of Cyber Knake pp 1 - 27 Insecurity Group Assignment Plans Due ****************** Group 1 PRESENTATIONS ******************

4 Feb 22 Virtual

Security Mechanisms at Scale Sensing & Control Tools

Patterson Ch 6, Ch 7 Winterfeld - Ch 5

5 Feb 29 F2F *** 6 Mar 7 F2F

Global Cyberspace Visions Doctrines & Strategies

Winterfeld Ch 3

Group 2 PRESENTATIONS Human Capital in Cybersecurity Warriors, Forces, & Militia

******************

Winterfeld Ch 4

*** 7 Mar 14 F2F ***

Group 3 PRESENTATIONS

******************

Cybersecurity & Freedom Privacy, Censorship, & Civil Liberties on TBD a Global Scale Group 4 PRESENTATIONS ******************

8 Mar 28 F2F

Computer Network Operations (CNO) Computer Network Exploitation Computer Network Attack Computer Network Defense

Winterfeld Ch 8 Winterfeld Ch 9 Winterfeld Ch 10 ******************

***

Group 5 Presentations

9 Apr 4 F2F

Cyber Crime & Cyber Terrorism Non-State Actors in CNO

Winterfeld Ch 11

10 Apr 11 F2F

Supply Chain & Critical Infrastructure Logical-physical interface

Winterfeld Ch 6 Patterson Ch 14

11 Apr 18 Virtual

Mid-Term Exam due on April 18

****************** Send via e-mail only

12 Apr 25 F2F

Social Considerations Mapping Law Mapping Culture

Patterson Ch 15 Patterson Ch 17

***

Social Engineering Group Research Papers due on April 25

Winterfeld - Ch 7 ****************** Send via e-mail & hard copy

13 May 2 F2F ***

Technical & Business Considerations Outsourcing Mapping Technology Final Exams Due on May 2

Patterson Ch 13 Patterson Ch 16 ******************

14 May 9 F2F

Cyber Power Framework Analysis ****************** Group Presentations

15 May 16 F2F

Course Summary Course Critiques

S-ar putea să vă placă și