General information:
Name:
Impact of cybersecurity on international security
Code:
int.courses-326
Profile of education:
Academic (A)
Lecture language:
English
Semester:
Fall
Responsible teacher:
dr Świątkowska Joanna (joanna.swiatkowska@cc.agh.edu.pl)
Academic teachers:
dr Świątkowska Joanna (joanna.swiatkowska@cc.agh.edu.pl)
Module summary

Students will gain comprehensive knowledge on the impact of new technologies on modern conflicts and international security environment.

Description of learning outcomes for module
MLO code Student after module completion has the knowledge/ knows how to/is able to Connections with FLO Method of learning outcomes verification (form of completion)
Social competence
M_K001 Student will upgrade his ability to self-improvement. Case study,
Activity during classes
M_K002 Student will gain extended knowledge on what are the countermeasures to current security challenges. Completion of laboratory classes,
Activity during classes
Skills
M_U001 Student will be able to plan and realize the analytical process relevant to a given problem. Execution of laboratory classes,
Execution of exercises,
Execution of a project,
Case study,
Activity during classes
M_U002 Student will learn what role international organizations, states and other actors play in modern international security environment. Project,
Participation in a discussion,
Completion of laboratory classes,
Activity during classes
Knowledge
M_W001 Student will gain extended knowledge on modern threats to international security system. Completion of laboratory classes,
Activity during classes
FLO matrix in relation to forms of classes
MLO code Student after module completion has the knowledge/ knows how to/is able to Form of classes
Lecture
Audit. classes
Lab. classes
Project classes
Conv. seminar
Seminar classes
Pract. classes
Zaj. terenowe
Zaj. warsztatowe
Others
E-learning
Social competence
M_K001 Student will upgrade his ability to self-improvement. - - + - - - - - - - -
M_K002 Student will gain extended knowledge on what are the countermeasures to current security challenges. + - + - - - - - - - -
Skills
M_U001 Student will be able to plan and realize the analytical process relevant to a given problem. + - + - - - - - - - -
M_U002 Student will learn what role international organizations, states and other actors play in modern international security environment. + - + - - - - - - - -
Knowledge
M_W001 Student will gain extended knowledge on modern threats to international security system. + - + - - - - - - - -
Module content
Lectures:

The emergence of new technologies has brought significant ramifications on all the aspects of our reality. It has also changed the paradigms of national and international security systems. Currently, cybersecurity issues are clearly seen as strategic challenges both to nation states and international organizations (like NATO, the EU or the United Nations).
The main goal of the course is to identify and analyse the main consequences of this process.
Lectures will focus on:
1. Impact of new technologies on modern conflict and international security system.
2. Cyberthreats landscape.
3. Analysing cyberwar.
4. How do terrorists groups use cyberspace?
5. Spying in the digital world.
6. Information warfare conducted in cyberspace – a new dimension of conflict.
7. Cybercrimes – threat to the global economy.
8. International law and conflicts in cyberspace.
9. Conflict escalation in the information society and what can be done about it.

Laboratory classes:

1. Engagement of international organizations and states in keeping peace in modern security environment – part 1.
2. Engagement of international organizations and states in keeping peace in modern security environment – part 2.
3. Simulations.
4. Information Warfare in Social Media – threats and practical actions to stay safe.
5. Building confidence measures for cyberspace.
6. Constructing norms for responsible behavior in cyberspace.
7. How to protect democracy in digital era.

Student workload (ECTS credits balance)
Student activity form Student workload
Summary student workload 100 h
Module ECTS credits 4 ECTS
Participation in laboratory classes 14 h
Completion of a project 30 h
Participation in lectures 20 h
Preparation for classes 36 h
Additional information
Method of calculating the final grade:

Final Grade = 0.4 EG (test) + 0.6 LG (small projects; performance during classes).

Prerequisites and additional requirements:

Ability of texts analysing

Recommended literature and teaching resources:

Robert O. Keohane, Joseph S. Nye, Jr., Power and Interdependence in the Information Age, “Foreign Affairs”; Sep/Oct 1998; 77, 5. [Available online].
Joseph S. Nye, Jr., Cyber Power, Belfer Center for Science and International Affairs, Harvard Kennedy School, 2010. [Available online].
Alvin Toffler, Heidi Toffler, War and Anti War, Warner Books Printing 1993.
Henry Kissinger, World Order, Penguin Books 2014. Chapter 9: Technology, Equilibrium and Human Consciousness, pp. 330-365.
Thomas Rid, Cyber War Will Not Take Place, Oxford University Press, 2013.
Joanna Świątkowska (eds.), NATO Road to Cybersecurity, Kosciuszko Institute 2016. [Available online].
Joanna Świątkowska, Magdalena Szwiec, Ana-Isabel Llacayo, Make a Bomb in the Kitchen of Your Mom – How Terrorists Use Cyberspace and How to Fight with Them, The Kosciuszko Institute Policy Brief 2016. [Available online].
NATO Stratcom, Daesh information campaign and its influence, 2016. [Available online].
Marc Goodman, Future crimes: everything is connected, everyone is vulnerable and what we can do about it, Doubleday 2015.
James A. Lewis, Compelling Opponents to Our Will’: The Role of Cyber Warfare in Ukraine, Kenneth Geers (Ed.), Cyber War in Perspective: Russian Aggression against Ukraine, NATO CCD COE Publications, Tallinn 2015. [Available online].
NATO Stratcom, The Kremlin and Daesh information Activities, 2016. [Available online].
Margarita Levin Jaitner, Russian Information Warfare: Lessons from Ukraine, Kenneth Geers (Ed.), Cyber War in Perspective: Russian Aggression against Ukraine, NATO CCD COE Publications, Tallinn 2015. [Available online].
Wiesław Goździewicz, Cyber Tools in Hybrid Operations. International Law and Cyber Activities Below the Threshold of an Armed Attack, “The Magazine of the Joint Force Training Centre”, September 2017, Issue No 10, pp.25-36. [Available online].
Patryk Pawlak, Confidence-Building Measures in Cyberspace: Current Debates and Trends, Anna-Maria Osula, Henry Rõigas (Eds.), International Cyber Norms: Legal, Policy & Industry Perspectives, NATO CCD COE Publications, Tallinn 2016, pp. 129-153. [Available online].
James Andrew Lewis, Rethinking Cybersecurity: Strategy, Mass Effect, and States, CSIS, January 2018. [Available online].
Nicholas Schmidle, The Digital Vigilantes Who Hack Back, “New Yorker”, 30.04.2018. [Available online].
Martin Libicki, Crisis and escalation in cyberspace. RAND 2012. [Available online].
K. Ziolkowski (red.), Peacetime Regime for State Activities in Cyberspace. International Law, International Relations and Diplomacy. Tallin: NATO CCD COE Publication. Chapters: State Actors and their Proxies in Cyberspace; Cyber Diplomacy: Agenda, Challenges and Mission; Peacetime Cyber Espionage – New Tendencies in Public International Law, other as additional reading). [Available online].
Materials prepared by the teacher.

Scientific publications of module course instructors related to the topic of the module:

Joseph S. Nye, Jr., The Future of Power, New York 2011.
Alvin Toffler, Third Wave, Bantam Books 1980.
NATO Stratcom, The Next Phase of Russian Information Warfare (by Keir Giles), 2016. [Available online].
Jarno Limnell, Developing a Proportionate Response to a Cyber Attack, Aalto University publication series, Science & Technology, 3/2016. [Available online].
EUROPOL, IOCTA 2017 Internet Organised Crime Threat Assessment. [Available online].
General Secretariat of the Council of EU, Council Conclusions on Cyber Diplomacy, 6122/15, Brussels, 11 February 2015 (Toolbox). [Available online].
Joint Communication to the European Parliament and the Council, Joint Framework on Countering Hybrid Threats, JOIN 18 final, Brussels, 6.4.2016. [Available online].
Joint Communication to the European Parliament and the Council, Resilience, Deterrence and Defence: Building strong cybersecurity for the EU, JOIN, 450 final, Brussels, 13.9.2017. [Available online].
Alexander Klimburg, The Darkening Web. The War for Cyberspace, New York 2017.
David J.Lonsdale, The Nature of War in the Information Age, Clausewitzian Future, Frank Cass, 2004.
Gordon Corera, Cyber Spies. The Secret History of Surveillance, Hacking, and Digital Espionage, Pegasus Books 2016.
James A. Green (eds.), Cyber Warfare a Multidisciplinary analysis, Routledge 2015.
James Andrew Lewis, Managing Risk for the Internet of Things, CSIS February 2016. [Available online].
Michael N. Schmitt, Wired warfare: Computer network attack and jus in bello, RICR Juin IRRC June 2002 Vol. 84 No 846, pp. 365-398. [Available online].
Sean Kanuck, Protecting The Electoral Process And Its Institutions, GCSC Thought Piece, January 2018.
Materials prepared by the teacher.

Additional information:

None