Course Description: This course explores the battlefields, participants, tools and techniques used in modern cyber conflict. It provides an overview of how cyber conflicts are carried out, how they will change in the future, and how to detect and defend against espionage (including hactivism, insider threats, national-state actors, non-state actors, organized crime, and terrorists).

Required Text:

  • Andress, J., & Winterfeld, Steve (2011). Cyber Warfare Technique: Tactics and Tools for Security Practitioners. Waltham, MA: Syngress.

Optional Resources:

  • Healey, Jason (2013). A fierce Domain: Conflict in Cyberspace, 1986 to 2012. Arlington, VA: Cyber Conflict Studies Association.
  • Additional course materials will be identified and made available through laulima.hawaii.edu. Supplemental resources for information technology and cyber security are located at the UHWO Cyber Security Coordination Center.

Prerequisites: ISA 330

Student Learning Outcomes

  1. Students will be able to identify the bad actors in cyberspace and compare and contrast their resources, capabilities/techniques, motivations, and aversion to risk (ILO 4; BASLO 1; ISALO 3).
  2. Students will be able to describe different types of attacks and their characteristics (ILO 3; BASLO 3; ISALO 2).
  3. Students shall be able to list the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data (ILO 4; BASLO 4; ISALO 3).
  4. Students shall be able to describe their responsibilities related to the handling of information about vulnerabilities (ILO 1; BASLO 2; ISALO 1).
  5. Students will be able to describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it (ILO 1; BASLO 4; ISALO 3).