Study-Unit Description

Study-Unit Description


CODE IRL5092

 
TITLE Cybersecurity

 
UM LEVEL 05 - Postgraduate Modular Diploma or Degree Course

 
MQF LEVEL 7

 
ECTS CREDITS 9

 
DEPARTMENT International Relations

 
DESCRIPTION Key words that we increasingly see in the media with regard to the Internet include stolen digital assets, attacks on government servers, Internet fraud, child pornography. There is growing concern about misuse and abuse of the Internet. How do we ensure the future growth of the Internet as a facilitator of global economic and social growth, while also addressing the risks that it creates? Cybersecurity is now on diplomatic agendas for discussion of cross border, global and international issues. This course will give diplomats the background to understand the critical issues for Internet security, and will prepare diplomats to engage in global discussions.

By the end of the study-unit, participants should be able to:

• identify the defining features of cybersecurity, and the factors which shape the international issues;
• identify principal threats to cybersecurity, describe and analyse the key cybersecurity issues for users, and states;
• understand and analyse the Internet security issues for e-commerce including online banking and identity;
• explain the issues involved in cybercrime, its impact and investigation;
• understand the threats to the core Internet infrastructure;
• explain the concepts of cyberwarfare and cyberterrorism, and their role in international Internet policy;
• understand and assess the challenges involved in social aspects of cybersecurity;
• explain and analyse the international frameworks for cybersecurity policies and strategies.

Study Topics:

1. Introduction to Cybersecurity: discusses the historical development of cybersecurity, and distinguishes between the common, narrow, understanding of cybersecurity related to cyber-threats, and broader views which include information security and ‘friendly’ cyber conquest through technological standardisation dominance.

2. Cybersecurity threats focuses on vulnerabilities of the Internet. The module reviews key vulnerabilities of cyberspace and common cyber-security threats to individuals and institutions, such as malware (including spyware, Trojans, viruses), botnets, 'Distributed Denial of Service' (DDoS), phishing, e-scams, and identity theft.

3. Cybercrime defines and classifies cybercrime, and analyses its economic and social impact. The module then focuses on combatting cybercrime: existing legal frameworks at the global and regional levels, international cooperation frameworks and various law enforcement approaches, computer investigation, and e-forensics.

4. Internet safety defines Internet safety, and reviews the challenges of the Web 2.0 era where users are contributors and the Internet is ubiquitous. It then looks at child safety, including cyber-bullying, abuse, and sexual exploitation, and discusses ways to address these challenges through policy, education, and technology.

5. Critical infrastructure and resources explains how the critical components of the Internet work, and discusses the political dimension of global security - the (unilateral) control over the Domain Name System (DNS) - and technical vulnerabilities of the DNS. It then looks at the security and protection of the critical infrastructure: the Internet infrastructure and also water supply facilities, transport, industrial facilities, and power plants. It concludes with expected challenges of future networks: Internet of Things/Next Generation Networks and ‘smart networks’.

6. Cyber-conflict and cyberterrorism discusses cyberterrorism, recent threats, and possible counteracts. It then looks at cyber-conflicts, including the main risks for triggering warfare by cyber-means, and reviews attempts to codify international humanitarian law with regards to cyberspace and draft confidence-building measures and norms related to state behaviour in cyberspace.

7. Cyber-security policies and mechanisms analyses national cybersecurity mechanisms, starting with examples of national cybersecurity strategies, followed by a close look at the importance, role, and structure of national Computer Emergency Response Teams (CERTs) / Computer Security Incident Response Teams (CSIRTs). The module then looks at existing international cybersecurity initiatives and frameworks for cooperation, including those by the private sector and technical community, and discusses the importance and risks of public-private partnerships.

8. Broader context of cybersecurity correlates cybersecurity and other social and political issues related to digital policies and Internet governance. The module looks at the connection between privacy and security, with particular reflection on social media challenges, issues of openness and online freedoms, and objectionable and harmful content. It then briefly covers ethics and gender issues, and concludes with discussing economic aspects and building trust in e-commerce.

Reading List:

- Clarke R (2010) Cyberwar. New York: HarperCollins.
- Headrick D (1991) The Invisible Weapon: Telecommunications and International Politics 1851-1945. Oxford: Oxford University Press.
- Nye J (2010) The Future of Power. New York: Public Affairs.
- Seimann G (2006) Terror on the Internet: The New Arena, the New Challenges. Washington D.C.: United States Institute of Peace.

 
ADDITIONAL NOTES Pre-Requisite Study-units: IRL5003 - Internet Governance

 
STUDY-UNIT TYPE Grp Learning, Independent Onl Learning & Lectures

 
METHOD OF ASSESSMENT
Assessment Component/s Sept. Asst Session Weighting
Assignment Yes 30%
Classwork No 30%
Assignment Yes 40%

 
LECTURER/S

 

 
The University makes every effort to ensure that the published Courses Plans, Programmes of Study and Study-Unit information are complete and up-to-date at the time of publication. The University reserves the right to make changes in case errors are detected after publication.
The availability of optional units may be subject to timetabling constraints.
Units not attracting a sufficient number of registrations may be withdrawn without notice.
It should be noted that all the information in the description above applies to study-units available during the academic year 2023/4. It may be subject to change in subsequent years.

https://www.um.edu.mt/course/studyunit