Many universities are starting to include cybersecurity as a course of study. While there is a high degree of variation between the selected readings of the syllabi of cybersecurity courses across different universities, there is some thematic overlap. By reviewing the syllabi of university cybersecurity courses, the authors seek to systematically evaluate this nascent field and advance its maturity.
Threats to national and economic security emanating from cyberspace are all too real, but public disclosure of incidents of the theft of intellectual property (IP) is exceedingly rare. Former National Security Agency Director and the first Commander of Cyber Command Keith Alexander has labeled China’s theft of U.S. intellectual property through cyber means “the greatest transfer of wealth in history.” Few experts in the field dispute that conclusion. In November 2015, National Counterintelligence Executive William Evanina estimated that cyber-enabled economic espionage cost the U.S. economy $400 billion per year, with 90 percent of the theft originating in China.
In a recent article in Contemporary Security Policy, Florian J. Egloff reflects on the contested nature of public attributions of cyber incidents and what role academia could take up.
In the last five years, public attribution of cyber incidents has gone from an incredibly rare event to a regular occurrence. Just in October 2018, the UK’s National Cyber Security Centre publicized its assessment of cyber activities conducted by the Russian military intelligence service (also known by its old acronym, the GRU). Clearly, publicizing activities that other political actors like to keep secret is a political act – but what kind of political act is it and what happens when a government publicly attributes?
This week’s featured graphics outline how cybersecurity responsibilities are shared among governmental organizations in the Netherlands. For more information on national cybersecurity strategies and cybersecurity challenges in Italy, as well as in Finland, France, Germany, Israel, Italy and Switzerland, read Marie Baezner and Sean Cordey’s CSS cyber defense report here.