Category: cyberfirst 9/12 project

cyber 9 12 strategy challenge week 4

Cyber 9/12 Strategy Challenge WEEK 4: Bringing it all together – Cyber Resilience Policy Development 

go to 9/12 home page

 

In this final week of the Module, participants will explore how non-technical cyber security considerations form the foundation of national and international policy solutions. Cyber security and cyber resilience cannot be achieved by technical means alone. As weeks 1, 2 and 3 of this Module have shown, there are political, economic, social, legal and increasingly environmental considerations to take into account in addition to the technical (the PESTLE approach to cyber security). Effective policy must, if possible, draw together these elements as they are each important parts of wider solutions. 

 

In this unit, students will explore what makes effective policy in the cyber context when dealing with major cyber incidents targeting critical national infrastructure. Crucial to this is the ability to combine and address different thematic areas and create succinct policy recommendations that still achieve particular goals and make states resilient to cyber incidents. 

Learning outcomes

By the end of Week 4, students will have:

  1. Brought together the previous three weeks learning to develop holistic policy solutions.
  2. Understood and made aware of how technology, law and (inter)national politics interact.
  3. Analysed a major cyber incident from a holistic, non-technical perspective.
  4. Confidently provided, recommended and discussed holistic cyber resilience policy solutions which do not solely rely on technical tools.
  5. Navigated the complexities of reserved (Westminster) and devolved (Holyrood) areas of policy in relation to cyber issues

1. Watch this video

YouTube player

2. Read these
3. Group activities

In your groups, discuss how to develop holistic policy solutions incorporating, or at least acknowledging and addressing, the political, economic, social, technical, legal and environmental aspects of cyber security

 

In your groups, prepare a 10minute presentation addressing the unit’s three questions:

Provide 3 policy recommendations to help Scotland be more resilient against Stuxnet-style operations. Think about:

  1. The way Stuxnet entered the target system.
  2. The impact of the operation if successful.
  3. Explain and support your choices.
  4. Set out the cross-government (UK and Scotland) policy relationships that need to be considered?
4. Assessment

10-minute oral presentation and feedback from module leader 

cyber 9 12 strategy challenge week 3

Cyber 9/12 Strategy Challenge WEEK 3: “An attack, or not an attack: that is the question” – Cyber Incidents and international law

go to 9/12 home page

 

In this unit students will be introduced to one of the most complex areas of cyber security: its relationship with international law, specifically the International Laws of Armed Conflict and International Humanitarian Law. 

 

Many major cyber incidents, such as Stuxnet, do not explicitly, categorically or obviously breach international law. Making a case is problematic and requires careful consideration and argument. In this unit, students will receive an introduction to international law, how it can be applied to major cyber incidents, and what states can do should they experience one.  

 

In all of the above, the key skill participants will gain is arguing for and making a case for a particular view, even when there is no clear-cut right or wrong answer. The key skill is creating and presenting a particular case to decision-makers. 

 

One of the critical areas to be covered in this section is the complex relationship between reserved and devolved responsibilities when responding to cyber incidents. While these policy areas are clearly separated between the UK Government (which retains cyber security policy) and the Scottish Government (which is concerned about the impact of a cyber incident on Scotland and its people), the nature of cyber incidents is such that the distinction between devolved and reserved areas is blurred. How policy- and decision-makers navigate these complexities is increasingly important in today’s digitalized world. 

Learning outcomes

By the end of Week 3, students will have:

 

  1. Explored the Laws of Armed Conflict (LOAC) and International Humanitarian Law (IHL) and set out basic foundations for these bodies of law to increase awareness of these legal instruments.
  2. Explored the complex natured relationship cyber security and resilience has with IHL and LOAC by examining a major cyber incident (Stuxnet) the legal position.
  3. Discussed and explained with increased confidence how cyber incidents relate to international law, acknowledging the complex nature of that relationship and the fact that the students are not trained lawyers.

1. Watch this video

YouTube player

2. Read these
3. Group activities

In your groups, discuss how, or if, international law can be applied to cyber incidents.

 

In your groups, prepare a 10minute presentation addressing the unit’s four questions:

  1. In your opinion, can major cyber incidents breach International Law? Explain your answer using Stuxnet as an example.
  2. What elements of International Law are relevant to the discussion of major cyber incidents such as Stuxnet?
  3. Who or what policies and enforces the international laws relevant to your answers to Questions 1 and 2?
  4. Which policy areas that are devolved to Scotland could be impacted by a cyber incident?
4. Assessment

10-minute oral presentation and feedback from module leader 

cyber 9 12 strategy challenge week 2

Cyber 9/12 Strategy Challenge WEEK 2: Beyond the Middle East – The International Relations’ impacts of cyber incidents

go to 9/12 home page

 

In this unit, participants will explore how cyber operations and incidents can impact how states interact with one another. Major incidents such as Stuxnet have important geopolitical and geostrategic implications and can change the way states deal with one another. 

 

To understand how cyber operations fit into this complex landscape, participants will first be introduced to the foundations of the field of International Relations. Participants will explore some of the key theories of the field and what they mean, and also examine how “cyber” is changing those theories. The goal is to look beyond purely technical consequences of major cyber incidents and to explore how an incident identified in one part of the world can send political ripples all around the globe. 

 

Finally, participants will look at how private companies engage in international powerplay and what impact this has on international relations and strategy. 

Learning outcomes

By the end of Week 2, students will have:

  1. Examined the international impacts and consequences of major cyber incidents, using Stuxnet as an example.
  2. Explored the concepts and theories of the field of “international relations”.
  3. Placed cyber incidents in that international context, with the understanding that technological events can have non-technological consequences beyond their immediate vicinity.
  4. Explained and discussed the international implications of cyber incidents to a non-technical or non-IR-expert group of policy-makers.

1. Watch these videos

YouTube player

YouTube player

2. Read these
3. Watch this video

Microlecture/YouTube Video Prof Noah Zerbe

YouTube player

This video Is heavily focussed on US policy and responses, as that is the topic of the microlecture. However, the overall themes are universal – all states deal with these issues. Prof Zerbe provides an example of how a state responds

4. Group activities

In your groups, discuss how major cyber incidents such as Stuxnet have an impact on the way states interact with one another.

Then, in your groups, prepare a 10minute oral presentation explaining the impacts of major cyber incidents on international politics. Prepare answers to the unit’s three questions. 

 

  1. What was the impact on the international community of: 

a. The discovery of Stuxnet in the open Internet? 

b. The Stuxnet operation itself? 

2. Who were the primary players in this operation? What is your evidence/explanation for this? 

3. What, if any, was the impact on International Relations of a private company – and not a national security or intelligence agency – discovering and publishing the existence of Stuxnet? 

 

Be prepared for additional questions from your Module Leader. 

5. Assessment

10 minute oral presentation and feedback from module leader 

cyber 9 12 strategy challenge week 1

Cyber 9/12 Strategy Challenge WEEK 1: Explaining the Technical Challenges

go to 9/12 home page

In this unit, module participants will delve into the intricate technical dimensions of Stuxnet, an unprecedented cyber weapon, in order to be able to clearly explain technical cyber issues to a non-technical audience of decisionmakers. Exploring its architecture, students will dissect Stuxnet’s code, uncovering advanced techniques like code injection and zero-day exploits.  

 

Through videos and real-life technical analyses of a major cyber incident, learners will grasp the malware’s propagation methods and its tailored attack on industrial systems, particularly Iran’s nuclear facilities. Discussions should revolve around Stuxnet’s implications for global cybersecurity, emphasizing the significance of understanding such sophisticated threats. By immersing themselves in Stuxnet’s technical intricacies, students will gain insights into the evolving landscape of cyber warfare and the importance of robust defense strategies, while also gaining and practicing key discussion skills. 

Learning outcomes

By the end of Week 1, learners will have:- 

  1. Examined the technical aspects of a major cyber security incident with international consequences. Stuxnet is the example being analysed.
  2. Learned about the technical elements of Stuxnet.
  3. Learned about and understood how stuxnet was deployed and the implications of this for national infrastructure.
  4. Practised describing and explaining these technical elements to a non-technical audience of decision-makers.

1. Watch this video

YouTube player

2. Read these
3. Watch this video

YouTube player

4. Group activities

In your teams, examine how Stuxnet operates and its technical impact  

In your groups, prepare a 10minute presentation addressing the unit’s three questions: 

  1. What was the primary attack vector for Stuxnet deployment? What is the significance of this? 
  2. Which vulnerabilities did Stuxnet exploit? 
  3. How can a country like Scotland guard against this particular kind of deployment? 

 

5. Assessment

10-minute oral presentation and feedback from module leader