1-analyse the concept of cybersecurity
2-demonstrate knowledge of cybersecurity’s history, approaches and how these developed over time.
3-differentiate between cybersecurity in terms of both ‘threats to’ and ‘threats from.
4-conceptualise cybersecurity in relation to international relations theory
5-differentiate between critical and conventional theoretical approaches and identify which theories are useful in understanding cyber security
6-define what features contribute to cybersecurity as ‘securitised’
7-analyse cybersecurity as ‘securitised’.
8-identify the features of information warfare
9-define the concept of information warfare
10-define ‘cybered conflict’
11-analyse how cyber technologies are impacting traditional warfare using examples.
12-describe and analyse the various characteristics of threats posed via cyberspace
13-identify historical examples of different cyber ‘weapons’ (worms, viruses, etc.)
and how these have developed over time
14-analyse which actors develop cyber attacks and explain for what purposes
15-evaluate the significance of the Stuxnet attack.
16-analyse the concept of cyberwarfare and the ‘cyber arms race’
17-describe the extent to which cyberwarfare represents a global security concern
18-explain the concept of the ‘attribution problem’
19-analyse the nature of the ‘attribution problem’, and why it exists in cyber attacks
20-explain the challenge that attribution presents to cybersecurity and deterrence.
21-What are some of the most prominent examples of cyber attacks?
22-What are some of the common targets of cyber attacks?
23-For what purposes are cyber attacks launched?
24-In your opinion, do these constitute acts of cyberwarfare?
25-What is the significance of Stuxnet for the future of cybersecurity?
26-What are the most prominent threats to security in terms of cyberwarfare?
27-How does Rid (2012) support his claim that ‘cyberwar will not take place’ and do you agree with this position?
28-Does the cyber realm present a new site for warfare, or does it simply facilitate extant strategies?
29-What challenges does attribution present in cybersecurity?
30-Why is the problem of attribution an issue for understanding and responding to cybersecurity?
31-What challenges does attribution present in terms of deterrence? Do you view this as a significant problem (which will likely relate to the extent to which you see cyber security/warfare as a significant threat)?