Case Study 2 Classical Strategy and Cyberwar Winter 2023
.pdf
keyboard_arrow_up
School
Southern Alberta Institute of Technology *
*We aren’t endorsed by this school
Course
256
Subject
English
Date
Feb 20, 2024
Type
Pages
4
Uploaded by CorporalRose11061
C
LASSICAL
S
TRATEGY
IN
C
YBERWAR
Essay Topic:
Writing groups will write an essay examining recent examples of cyberwar. Students will need to select a recent case study involving a state-sponsored cyberattack, and discuss the ways in which this attack is consistent or inconsistent with concepts drawn from classical strategy. Papers should be between 2500 and 3000 words (roughly 10-12 pages). A successful paper will describe the event being studied (no more than 2-3 pages), and then analyze the event with reference to classical thinkers such as Sun Tzu,
Wylie, or Corbett. Papers should include a brief section (1-2 pages) discussing the implications of the case for contemporary cybersecurity. Assess strategies using questions like those we have employed in class:
What is the goal? What resources are available? How can those resources be used? How long will this take? How long does the actor have? What are the risks incurred by implementing this plan?
What are the risks of not acting or of failure?
Papers must have 4-5 scholarly or expert sources describing the cyberattack. Additionally, papers must discuss concepts from at least two of the classical thinkers (more than two are permitted, but not required). Papers will use in-text citations (name, date, and page number) and include a separate reference page (which does not apply to the document word count). Please refer to The Publication Manual of the American Psychological Association 7
th
Edition
or to The Purdue OWL
’s APA guidelines for further details on citation formatting.
Groups may choose from the list of topics below. The assignment is valued at 25% of the total class grade. Essays should be submitted to D2L for both ITSC 201 and Communications 256 by 2100 on April 16
. Students who anticipate difficulties meeting deadlines should consult with the instructor as soon as possible. 1 ICT: Military and Strategic Studies
© 2017, Southern Alberta Institute of Technology
C
LASSICAL
S
TRATEGY
IN
C
YBERWAR
Topics Groups may select from the topics indicated below. 1 Cyberwar in the Russo-Ukrainian War (2022-23)
2 Predatory Sparrow and the Israeli-Iranian competition
3 Lazarus Group’s financial attacks (including cryptocurrency)
4 Log4J and Open Source supply chains
5 Non-state participation in cyberconflict 6 The operation against the Hive ransomware group
Resources
Students are encouraged to begin their research by consulting recent studies of cyberwar. The references below may be of particular interest, but these are merely a starting point.
Buchanan, B. (2020). The hacker and the state
. Harvard University Press.
Greenberg, A. (2019). Sandworm
. Doubleday.
Kello, L. (2017). The virtual weapon and international order. Yale University Press.
Maurer, T. (2018).
Cyber mercenaries: The state, hackers, and power.
Cambridge University Press. Rid, T. (2020). Active measures. Farrar, Strauss, and Giroux. Sanger, D. (2018). The perfect weapon: War, sabotage, and fear in the cyber age. Crown.
Segal, A. (2016). The hacked world order: How nations fight, trade, maneuver, and manipulate in the digital age. Public Affairs. Singer, P. (2018). Likewar: The weaponization of social media. Mariner. Watts, C. (2018). Messing with the enemy.
Harper. Zetter, K. (2015). Countdown to zeroday.
Broadway.
Assessment:
2 ICT: Military and Strategic Studies
© 2017, Southern Alberta Institute of Technology
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help