Program‎ > ‎

7.4 Cybersecurity Governance

Class Outline
   cybersecurity - general
   cyber surveillance
   cyber warfare
   cybersecurity norms
   stakeholders of cybersecurity governance
   multistakeholder model for cybersecurity governance

Main Functions of Cyberspace Governance (by DeNardis and Raymond, Thinking clearly....)
   securing network infrastructure
   designing encryption standards
   cybersecurity regulations/enforcement
   correcting software security vulnerability
   sofware packet management
   securing routing, addressing, DNS
   responding to security problems
   trust intermediaries authenticating web sites

Class Description (by Eneken Takk)
   This class will contextualize and open the still emerging theme of cybersecurity governance. On the one hand, this topic builds on the strategic contestation between leading cyber powers – the US, China, and Russia – in the context of the UN First Committee resolution on international information security and the dialogue on norms, rules and principles of responsible state behavior in their use of ICTs. On the other hand, this term is also rooted in the increasing concern about national governments’ ability to effectively govern the ICT-centric way of life as well as critical ICT dependencies.

Class Description (by Koichiiro Komiyama)
  Since the early age of the Internet, there was widely accepted belief "The Internet is borderless". With that brief, efforts were made in ruling cyberspace with keeping internet free and open. This lecture revisits the 30-year history of CSIRT(CERT), Computer Security Incident Response Team. This community of cyber security engineers has been a crucial instrument to remedy damages caused by incidents. Also, CSIRT community helped in shaping policies, standardization and most importantly global or international cooperation. This lecture also explains, few cases that prove cyber security is becoming a part of national security. With the emergence of offensive cyber capability within states, global cooperation is now exposed to the crisis. Together with attendees, we would like to have an open discussion on how technical/non-government community can stand up for militarization of cyberspace. More specifically, will normative approach help in recovering the trust in cyberspace.

Lecturer Pool: Eneken Tikk

Candidate Lecturer: Koichiro Komiyama

  Dennis Broeders, Public core of the internet, WRR Policy Brief 2, PB002-Public-Core-Internet.pdf, 2015.4. (also from Amsterdam University Press, 2017) 
  Center for Long-Term Cybersecurity, Cybersecurity Futures 2020, UC Berkeley, 2016.
  China (CNSIC), National Cyberspace Security Strategy, 2017.12.27.
  Kilnam Chon, Cybersecurity Governance, 2016. [ppt]
  Kilnam Chon, IoT Security-Proposal, 2016.12.9.
  Commission on Enhancing National Cybersecurity, Report on Securing and Growing Global Digital Economy, US Government, 2016.12.1. 
  Council on Foreign Relations, A Cyber Norms Hypothetical: What If the USS John S. McCain Was Hacked?, 2018.8.
  Cymetria, Introduction to Cyber Deception, 2018. 
  Laura DeNardis and Mark Raymond, (6) Cybersecurity Governance, in Thinking Clearly on Multistakeholder Internet Governance, 2013.
  East West Institute, Promoting International Cyber Norms: A New Advocacy Forum, 2015.12.

  EFF, Security education comparison, 2017.11.
Guardian, Dispute along cold war lines led to collapse of UN cyberwarfare talks, 2017.8.25.

 Global Commission on Stability of Cyberspace (GCSC), 2017.
  GCSC, Singapore Norm Package, 2018.11.
  Melissa Hathaway,
Future of Cybersecurity (youtube), 2017.

  ITU, International stakeholders for cybersecurity ecosystem.
  Angela McKay, et al., International Cybersecurity_Norms, 2014.12.
  Koichiro Komiyama, Bio,  Bio-GCSC, 2018. 
  MacKenzie, Finding a strategic cybersecurity model, 2017. [podcast]
  Microsoft, From articulation to implementation; Enabling progress on cybersecurity norms, 2017.6.
  Microsoft (Ciglic, McKay,..), Building on experience: a framework for cybersecurity policy, 2018.8.
  MIT Technology Review, Patching the electric grid, 2017.5.18.
  Eneken Tikk, Evolution of Cyber Domain, 2016.
  Eneken Tikk, Bio, 2018.1.
  Eneken Tikk, Cybersecurity Governance, APSIG, 2018.7.
  UN GGE on Cybersecurity, 2017.
  World Economic Forum, Understanding systemic cyber risk, White Paper, 2016.
  World Economic Forum, 2018 Global Risk Report (with Video), 2018.
  World Federation of Scientists,  Erice Declaration on Principles for Cyber Security and Cyber Peace, 2009.
Remark: Some of this class content could be covered in 6.1 Cybersecurity - General.