Lorem, Ipsum Cyber threats and trends WEEK 7 FINAL ESSAY Essays require students to apply insights and concepts from the course to contemporary, real-world

Lorem, Ipsum Cyber threats and trends WEEK 7 FINAL ESSAY
Essays require students to apply insights and concepts from the course to contemporary, real-world

Click here to Order a Custom answer to this Question from our writers. It’s fast and plagiarism-free.

Lorem, Ipsum Cyber threats and trends WEEK 7 FINAL ESSAY
Essays require students to apply insights and concepts from the course to contemporary, real-world issues. These must be between 1750-2000 words in length. Students are asked to identify one item in the news from 2021 and explain how it is connected to one of the themes that have been discussed in class so far. Students can either illustrate how the case that they chose illustrate an argument made in the course or how it provides a counterpoint to an argument found in the course material.

Module 1: Learning Materials
Readings
Read the following:
· W. Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know, Oxford University Press, 2014,
Part I

· Christopher Eldred, “Policymakers must understand 5G’s potential and its pitfalls,”
Berkeley Roundtable on the International Economy (BRIE) and Work and Intelligent Tools and Systems, December 2, 2019
https://blogs.berkeley.edu/2019/12/02/5g-hype-vs-reality-how-policymakers-can-harness-its-benefits/ (Links to an external site.)

· “Cyber Risk in an Internet of Things World,” Deloitte Flashpoints report, 2019.
https://www2.deloitte.com/us/en/pages/technology-media-and-telecommunications/articles/cyber-risk-in-an-internet-of-things-world-emerging-trends.html (Links to an external site.)

· NIST, “What is the Internet of Things and How Can We Secure It?” video to watch:
https://www.nist.gov/topics/internet-things-iot (Links to an external site.)

· “Cybersecurity Futures 2025,” University of California, Berkeley Center for Long-Term Cybersecurity and CNA’s Institute for Public Research report, 2019.
https://cltc.berkeley.edu/wp-content/uploads/2019/02/Cybersecurity-Futures-2025-Insights-and-Findings.pdf (Links to an external site.)

· US Cyberspace Solarium Commission report, 2020, Opening story of “Warning from Tomorrow” and p. 8-19.
https://drive.google.com/file/d/1ryMCIL_dZ30QyjFqFkkf10MxIXJGT4yv/view (Links to an external site.)

· Andy Greenberg, “Hacker Lexicon: What is a Supply Chain Attack?”, Wired, May 2021,
https://www.wired.com/story/hacker-lexicon-what-is-a-supply-chain-attack/ (Links to an external site.)

Download File

Supplemental Reading (Not required)
· Crowdstrike 2020 Global Threats Report, 8-12, Crowdstrike, 2020
https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf

Module 2: Learning Materials
Readings
Read the following:
· Accenture, Global Cost of CyberCrime, 2019.
https://www.accenture.com/_acnmedia/pdf-96/accenture-2019-cost-of-cybercrime-study-final.pdf#zoom=50 (Links to an external site.)

· Interpol, Cybercrime: Covid-19 Impact,
https://www.interpol.int/en/News-and-Events/News/2020/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19 (Links to an external site.)

· This is How Much a MegaBreach Really Costs, Dark Reading, July 2018
https://www.darkreading.com/threat-intelligence/this-is-how-much-a-mega-breach-really-costs/d/d-id/1332274 (Links to an external site.)

· “How the Equifax hack happened, and what still needs to be done,” CNET, September 2018.
https://www.cnet.com/news/equifaxs-hack-one-year-later-a-look-back-at-how-it-happened-and-whats-changed/ (Links to an external site.)

·
(Links to an external site.)
“The First Step: Initial Access Leads to Ransomware”, Proofpoint, June 2021,
https://www.proofpoint.com/us/blog/threat-insight/first-step-initial-access-leads-ransomware (Links to an external site.)

·
(Links to an external site.)
Robert Knake and Richard Clarke, The Fifth Domain, Penguin Press, 2019, p. 33 to 83

Actions

· Ponemon Institute, 2020 Cost of Data Breach Report.
PDF

Actions

Supplemental Reading (Optional Reading)

· Joseph Marks, The Cybersecurity 202: This Was the Month Cyberattacks Turned Fatal, September 23, 2020,
https://www.washingtonpost.com/politics/2020/09/23/cybersecurity-202-this-was-month-cyberattacks-turned-fatal/

Module 3: Learning Materials
Readings
Read the following:
· Andy Greenberg, The Untold Story of NotPetya, the Most Devastating Cyberattack in History, Wired, 2018,
https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ (Links to an external site.)

· alternatively, you can access the pdf file
here

Actions

.
· Andy Greenberg, “Chinese Hacking Spree Hit an ‘Astronomical’ Number of Victims”, Wired, March 2021,
https://www.wired.com/story/china-microsoft-exchange-server-hack-victims/ (Links to an external site.)

· Kim Zetter, An Unprecedented Look at Stuxnet, the world’s first digital weapon, Wired, Nov. 2014.
https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ (Links to an external site.)

· alternatively, you can access the pdf file
here

Actions

.
· “David Sanger on the perfect weapon,” Bulletin of Atomic Scientists, Oct 24, 2018
https://thebulletin.org/2018/10/david-sanger-on-the-perfect-weapon/ (Links to an external site.)

· A New Old Threat: Countering the Return of Chinese Industrial Cyber Espionage, CFR report, 2018.

https://www.cfr.org/report/threat-chinese-espionage (Links to an external site.)

· Lily Hay Newman, “Windows 10 Has a Security Flaw So Severe the NSA Disclosed It,” Wired, 2020,
https://www.wired.com/story/nsa-windows-10-vulnerability-disclosure (Links to an external site.)

· alternatively, you can access the pdf file
here

Actions

.
· Lily Hay Newman, “No One Knows How Deep Russia’s Hacking Rampage Goes”, Wired, December 2020,
https://www.wired.com/story/russia-solarwinds-supply-chain-hack-commerce-treasury/ (Links to an external site.)

· alternatively, you can access the pdf file
here

· Brian Barrett, “China’s and Russia’s Spying Sprees Will Take Years to Unpack”, Wired, March 2021,
https://www.wired.com/story/china-russia-spying-sprees-years-to-unpack/ (Links to an external site.)

· alternatively, you can access the pdf file
here

Supplemental Reading (Optional Reading)

· Emefa Addo Agawu, “How to Think About Election Cybersecurity: A Guide for Policymakers,” New America, April 3, 2018,
https://www.newamerica.org/cybersecurity-initiative/policy-papers/how-to-think-about-election-cybersecurity/ (Links to an external site.)

· Joshua Rovner, War on the Rocks, September 16, 2019. Cyber War as an Intelligence Contest,
https://warontherocks.com/2019/09/cyber-war-as-an-intelligence-contest/ (Links to an external site.)

Module 4: Learning Materials
Readings
Read the following:
· Singer and Freidman, Cybersecurity and CyberWar, 2015, pages
120-133

Actions

· Department of Defense Cyber Strategy, Summary 2019.
https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF (Links to an external site.)

· Richard Harknett, “United States Cyber Command’s New Vision: What It Entails and Why It Matters,” Lawfare, 2018
https://www.lawfareblog.com/united-states-cyber-commands-new-vision-what-it-entails-and-why-it-matters (Links to an external site.)

· Dina Temple-Raston, How the U.S. Hacked ISIS, NPR, September 26, 2019.
https://www.npr.org/2019/09/26/763545811/how-the-u-s-hacked-isis (Links to an external site.)

· Zachary Fryar Biggs, “Twilight of the Human Hacker,” Center for Public Integrity, 2020
https://publicintegrity.org/national-security/future-of-warfare/scary-fast/twilight-of-the-human-hacker-cyberwarfare/ (Links to an external site.)

· “Russian General Pitches Information Operations as a Form of War,” NY Times, 2019.
https://www.nytimes.com/2019/03/02/world/europe/russia-hybrid-war-gerasimov.html (Links to an external site.)

· alternatively, you can access the pdf file
here

Actions

.
· Lyu Jinghua, “What Are China’s Cyber Capabilities and Intentions?” Carnegie, 2019
https://carnegieendowment.org/2019/04/01/what-are-china-s-cyber-capabilities-and-intentions-pub-78734 (Links to an external site.)

· James Lewis, “Iran and CyberPower,” CSIS, June 2019.
https://www.csis.org/analysis/iran-and-cyber-power (Links to an external site.)

· Elsa Kania and John Costello, “The Strategic Support Force and the Future of Chinese Information Operations,” Cyber Defense Review, 2018.
https://www.jstor.org/stable/pdf/26427379.pdf (Links to an external site.)

· Brad D. Williams, “Retaliation Options: US Cyber Responses SolarWinds, Exchange Hacks”, Breaking Defense, March 2021,
https://breakingdefense.com/2021/03/retaliation-options-us-cyber-responses-to-solarwinds-exchange-hacks/ (Links to an external site.)

Supplemental Reading (Optional)

· Martelle, Michael, “Joint Task Force ARES and Operation GLOWING SYMPHONY: Cyber Command’s Internet War Against ISIL,” National Security Archives, August 2018.
https://nsarchive.gwu.edu/briefing-book/cyber-vault/2018-08-13/joint-task-force-ares-operation-glowing-symphony-cyber-commands-internet-war-against-isil (Links to an external site.)

Module 5: Learning Materials
Readings
Read the following:
· Peter W. Singer and Emerson Brooking, LikeWar, HMH 2019,
Chapter 4

Actions

and
Chapter 5

Actions

.
· “Hacking Democracies,” ASPI report, 2019.
https://www.aspi.org.au/report/hacking-democracies (Links to an external site.)

· Adrien Chen, The Agency, New York Times Magazine, 2015.
https://www.nytimes.com/2015/06/07/magazine/the-agency.html (Links to an external site.)

· alternatively, you can access the pdf file
here

Actions

.
· Hamilton 68 dashboard:
https://securingdemocracy.gmfus.org/hamilton-dashboard/ (Links to an external site.)

· James Shire, The Simulation of Scandal: Hack-and-Leak Operations, the Gulf States, and U.S. Politics, Texas National Security Review,2020:

https://tnsr.org/2020/08/the-simulation-of-scandal-hack-and-leak-operations-the-gulf-states-and-u-s-politics/ (Links to an external site.)

· Tweeting through the Great Firewall, ASPI report, 2019.
https://www.aspi.org.au/report/tweeting-through-great-firewall (Links to an external site.)

· Oxford University, “Coronavirus Misinformation: Weekly Briefings” 2020:
https://comprop.oii.ox.ac.uk/research/coronavirus-weekly-briefings/ (Links to an external site.)
(explore the weekly briefing)
· Mathew Rosenberg, Julian E. Barnes, Bible-Burning Video Goes Viral, A Win for Russia Disinformation, New York Times, September 23, 2020,
https://www-proquest-com.ezproxy1.lib.asu.edu/docview/2432729703?accountid=4485Links to an external site.

· Ben Collins, “How QAnon rode the pandemic to new heighs – and fueled the anti-mask phenomenon”, NBC, August 2020,
https://www.nbcnews.com/tech/tech-news/how-qanon-rode-pandemic-new-heights-fueled-viral-anti-mask-n1236695 (Links to an external site.)

· Just Security, “#StopTheSteal: Timeline of Social Media and Extremist Activities Leading to 1/6 Insurrection”, February 2021,

#StopTheSteal: Timeline of Social Media and Extremist Activities Leading to 1/6 Insurrection

Module 6: Learning Materials
Readings
Read the following:
· S. House, “Going Dark, Going Forward, A Primer on the Encryption Debate,” 2016.
https://fas.org/irp/congress/2016_rpt/hsc-encrypt.pdf (Links to an external site.)

· “Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities,” National Academies Committee on Offensive Information Warfare, 2009
http://sites.nationalacademies.org/cs/groups/cstbsite/documents/webpage/cstb_050541.pdf (Links to an external site.)

· Christopher Yoo, “Cyber Espionage or Cyber War?: International Law, Domestic Law, and Self-Protective Measures” University of Pennsylvania Law, 2015.
https://scholarship.law.upenn.edu/cgi/viewcontent.cgi?article=2541&context=faculty_scholarship (Links to an external site.)

· Eric Jensen, “The Tallinn Manual 2.0: Highlights and Insights,” Georgetown Journal of International Law, 2017.
https://www.law.georgetown.edu/international-law-journal/wp-content/uploads/sites/21/2018/05/48-3-The-Tallinn-Manual-2.0.pdf (Links to an external site.)

· Oona Hathaway et al, “The Law of Cyberattack,” California Law Review, 2012
https://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=4844&context=fss_papers (Links to an external site.)

· A Digital Geneva Convention to Protect Cyberspace, Microsoft, 2018:
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW67QH (Links to an external site.)

Module 7: Learning Materials
Readings
Read the following:
· US Cyberspace Solarium Commission report, 2020, p. 20-122:
https://drive.google.com/file/d/1ryMCIL_dZ30QyjFqFkkf10MxIXJGT4yv/view (Links to an external site.)

· National Cybersecurity Strategy of the United States, 2018
PDF

Actions

· Australia’s Cybersecurity Strategy, 2016.
https://cybersecuritystrategy.homeaffairs.gov.au/AssetLibrary/dist/assets/images/PMC-Cyber-Strategy.pdf (Links to an external site.)

· “Progress, Pauses, and Power Shifts in China’s Cybersecurity Law Regime,” DigiChina, 2018
https://www.newamerica.org/cybersecurity-initiative/digichina/blog/progress-pauses-power-shifts-chinas-cybersecurity-law-regime/ (Links to an external site.)

· Robert Knake and Richard Clarke, The Fifth Domain, Penguin Press, 2019,
p. 107 to 167

Actions

· “The World Wide Web Turns 30 Today. Here’s How Its Inventor Thinks We Can Fix It,” Time, March 12 2019.
https://time.com/5549635/tim-berners-lee-interview-web/ (Links to an external site.)

· US White House, “Executive Order on Improving the Nation’s Cybersecurity”, May 2021,
https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/ (Links to an external site.)

Looking for this or a Similar Assignment? Click below to Place your Order