Program‎ > ‎

7.4 Cybersecurity Governance

Class Outline
   overview
   cybersecurity - general
   cybercrime
   cyber surveillance
   cyber warfare
   cybersecurity norms
   stakeholders of cybersecurity governance
   multistakeholder model for cybersecurity governance

Main Functions of Cyberspace Governance (by DeNardis and Raymond, Thinking clearly....)
   securing network infrastructure
   designing encryption standards
   cybersecurity regulations/enforcement
   correcting software security vulnerability
   sofware packet management
   securing routing, addressing, DNS
   responding to security problems
   trust intermediaries authenticating web sites

Class Description (by Eneken Takk)
   This class will contextualize and open the still emerging theme of cybersecurity governance. On the one hand, this topic builds on the strategic contestation between leading cyber powers – the US, China, and Russia – in the context of the UN First Committee resolution on international information security and the dialogue on norms, rules and principles of responsible state behavior in their use of ICTs. On the other hand, this term is also rooted in the increasing concern about national governments’ ability to effectively govern the ICT-centric way of life as well as critical ICT dependencies.


Class Description (by Koichiiro Koizumi)
   [TBC]

Lecturer Pool: Eneken Tikk

Candidate Lecturer: Koichiro Koizumi

References
  Dennis Broeders, Public core of the internet, WRR Policy Brief 2, PB002-Public-Core-Internet.pdf, 2015.4. (also from Amsterdam University Press, 2017) 
  Center for Long-Term Cybersecurity, Cybersecurity Futures 2020, UC Berkeley, 2016.
  China (CNSIC), National Cyberspace Security Strategy, 2017.12.27.
  Kilnam Chon, Cybersecurity Governance, 2016. [ppt]
  Kilnam Chon, IoT Security-Proposal, 2016.12.9.
  Commission on Enhancing National Cybersecurity, Report on Securing and Growing Global Digital Economy, US Government, 2016.12.1. 
  Council on Foreign Relations, A Cyber Norms Hypothetical: What If the USS John S. McCain Was Hacked?, 2018.8.
  Cymetria, Introduction to Cyber Deception, 2018. 
  Laura DeNardis and Mark Raymond, (6) Cybersecurity Governance, in Thinking Clearly on Multistakeholder Internet Governance, 2013.
  East West Institute, Promoting International Cyber Norms: A New Advocacy Forum, 2015.12.

  EFF, Security education comparison, 2017.11.
 
Guardian, Dispute along cold war lines led to collapse of UN cyberwarfare talks, 2017.8.25.

 Global Commission on Stability of Cyberspace (GCSC), 2017.
  GCSC, Singapore Norm Package, 2018.11.
  Melissa Hathaway,
Future of Cybersecurity (youtube), 2017.

  ITU, International stakeholders for cybersecurity ecosystem.
  Angela McKay, et al., International Cybersecurity_Norms, 2014.12.
  Koichiro Komiyama, Bio, GCSC, 2018.
  MacKenzie, Finding a strategic cybersecurity model, 2017. [podcast]
  Microsoft, From articulation to implementation; Enabling progress on cybersecurity norms, 2017.6.
  Microsoft (Ciglic, McKay,..), Building on experience: a framework for cybersecurity policy, 2018.8.
  MIT Technology Review, Patching the electric grid, 2017.5.18.
  Eneken Tikk, Evolution of Cyber Domain, 2016.
  Eneken Tikk, Bio, 2018.1.
  Eneken Tikk, Cybersecurity Governance, APSIG, 2018.7.
  UN GGE on Cybersecurity, 2017.
  World Economic Forum, Understanding systemic cyber risk, White Paper, 2016.
  World Economic Forum, 2018 Global Risk Report (with Video), 2018.
  World Federation of Scientists,  Erice Declaration on Principles for Cyber Security and Cyber Peace, 2009.
  
Remark: Some of this class content could be covered in 6.1 Cybersecurity - General.