CONTACT CSU

GPM510 Cyber Security: Terrorism, Crime and Warfare in the 21st Century (8)

Abstract

Upon completion of this subject students will have developed a comprehensive knowledge and understanding cyber security issues and the complex social, political, domestic and international contexts of cyber-related matters. Students will have developed an holistic, critical, and wide-ranging knowledge and understanding of cyber security issues and possible future cyber security issues. Students will critically assess a variety of cyber security issues, critically consider existing theoretical frameworks and responses and contribute to theory development and innovation, and synthesise these through the production of extensive and sophisticated research based assessments and/or policy recommendations. Students will demonstrate expertise in discovering, critiquing, interpreting, and transmitting focused, specialist knowledge and understanding, while exhibiting autonomous, evidence based, expert judgment, while remaining adaptable and responsible in its application.

+ Subject Availability Modes and Location

Session 2
DistanceManly Campus
Session 3
DistanceManly Campus
Continuing students should consult the SAL for current offering details: GPM510
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject information

Duration Grading System School:
One sessionHD/FLAustralian Graduate School of Policing and Security

Learning Outcomes

Upon successful completion of this subject, students should:
  • apply an advanced knowledge of cyber security in a range of non-technical contexts for professional practice or scholarship, and as a pathway for further learning
  • possess knowledge of cyber security and related security contexts that includes the understanding of historical, contemporary, and ongoing developments in cyber security
  • demonstrate a knowledge of research principles and methods applicable to cyber security studies, policy, and practice
  • demonstrate mastery of theoretical knowledge in relation to cyber security, and to reflect critically on theory, professional practice and scholarship
  • possess high order capabilities in analysis and synthesis of complex cyber security related information, problems, concepts and theories and to apply and critique established theories to different bodies of knowledge or practice such as policing, broader law enforcement, intelligence, military or public policy domains
  • possess the capacity to generate and evaluate complex ideas and concepts related to cyber security, at an abstract level
  • be capable of technical research to justify and interpret cyber security related theoretical propositions, methodologies, conclusions and professional decisions to specialist and non-specialist audiences
  • possess technical and communication skills to design, evaluate, implement, analyse and theorise about cyber security related developments that contribute to professional practice or scholarship
  • be able to deonstrate creativity and initiative to new situations in professional practice and/or for further learning
  • possess high level personal autonomy and accountability
  • be able to plan and execute a substantial research-based project, capstone experience and/or piece of scholarship

Syllabus

The subject will cover the following topics:
  • Module 1: Information and Communications Technology and the Emergence of Cyber
  • 1.1 From the printing press to the internet: A history of information and communications technologies and social change
  • 1.2 The emergence of computer technology and dawn of the Information Age
  • 1.3 The age of the Internet: interconnected and interdependent
  • 1.4 William Gibson‘s collective hallucination: what is cyber?
  • Module 2: Securing Cyberspace: Different Perspective and Approaches
  • 2.1 Conceptualising cyber security
  • 2.2 Our Internet belongs to us: Cyberspace as a Domain
  • 2.3 The securitization/militarization of cyberspace: how the Internet became a threat
  • 2.4 Crypto Wars, Cypherpunks, and Crypto-Anarchists: information wants to be free!
  • Module 3: From Bullets to Bytes: Techniques, Tactics, and Tools
  • 3.1 Malware, Viruses, Worms, Trojans. Bots, Botnets, DOS, & DDOS? Case Study: Bots and Botnets
  • Module 4: Cyber Threats: Crime, Terrorism, Espionage and Warfare
  • 4.1 Cyberthreats: attribution, geography, and accessibility
  • Essential Reading
  • 4.2 Cyber Crime
  • Case Study: Russian Business Network
  • 4.3 Cyber Terrorism
  • Terrorist Use of the Internet
  • Cyber Threat to Critical Infrastructure
  • Cyber Threat to Critical Infrastructure
  • Hacktivism Terrorist use of the Internet
  • Source Material Resources for Terrorist use of the Internet
  • Critical Infrastructure Protection
  • Hacktivism
  • 4.4 Cyber Espionage
  • Case Study: Chinese Cyber Espionage
  • 4.5 Cyber Warfare
  • Case Study: Stuxnet
  • Module 5: The cyber-policy response: The national, the International and the private sector
  • Module 6: Cyber-power: an emergent element of Statecraft
  • Module 7: Whose data? Privacy and anonymity in cyberspace

Specialised Resources

Internet connection

Back

The information contained in the 2015 CSU Handbook was accurate at the date of publication: 01 October 2015. The University reserves the right to vary the information at any time without notice.