Key words that we increasingly see in the media with regard to the Internet include stolen digital assets, attacks on government servers, Internet fraud, child pornography.
There is growing concern about misuse and abuse of the Internet. How do we ensure the future growth of the Internet as a facilitator of global economic and social growth, while also addressing the risks that it creates?
The 10-week advanced thematic course in Cybersecurity covers in-depth aspects of privacy and security, core infrastructure and cyberterrorism, policies and strategies, as well as social aspects and other issues, including child online safety.
By the end of the course, participants should be able to:
Identify the defining features of cybersecurity, and the factors which shape the international issues.
Identify principal threats to cybersecurity. Describe and analyse the key cybersecurity issues for users, and states.
Understand and analyse the Internet security issues for e-commerce including online banking and identity.
Explain the issues involved in cybercrime, its impact and investigation.
Understand the threats to the core Internet infrastructure.
Explain the concepts of cyberwarfare and cyberterrorism, and how their role in international Internet policy.
Understand and assess the challenges involved in social aspects of cybersecurity.
Explain and analyse the international frameworks for cybersecurity policies and strategies.
The course forms part of the Thematic Phase of Diplo’s Internet Governance Capacity Building Programme (IGCBP). This phase offers in-depth courses that provide deeper understanding of a particular issue. Other courses forming part of this phase - which may run simultaneously or at a later date - include ICT Policy and Strategic Planning, E-participation, History of Internet Governance, Infrastructure and Critical Internet Resources, Intellectual Property Rights, and Privacy and Personal Data Protection.
Excerpt from course materials
‘...One side-effect of the rapid integration of the Internet in almost all aspects of human activity is the increased vulnerability of modern society. The Internet is part of the global critical infrastructure. Other core services of modern society, such as electric grids, transport systems, and health services are increasingly dependent on the Internet. As attacks on these systems may cause severe disruption and have huge financial consequences, they are frequent targets.’ (Lexture text 4.3)
The thematic course in Cybersecurity includes one week of hypertext practice and platform familiarisation and introduction, and 8 in-depth course texts:
Chapter 1. Introduction to security.
Chapter 2. Cybersecurity: online threats to individuals, privacy and security as challenges of cybersecurity, cybersecurity and public key infrastructure, building trust in e-commerce.
Chapter 3. Cybercrime: history of cybercrime; classification; impact; framework for combating cybercrime; law enforcement; computer investigation; forensics; legal aspects of computer forensics.
Chapter 4. Security of the Core Infrastructure: Domain Name System security; unilateral control, security Threats; future networks (smart networks/Internet of things).
Chapter 5. Cyberwarfare and Cyberterrorism: International norms; the Geneva Convention; definitions of war and cyberwar; links to national security and critical infrastructure; links to international initiatives; cyberterrorism, DoS; control/governance of CIR.
Chapter 6: Social Aspects of Cybersecurity: Privacy and security as challenges of cybersecurity; defining Internet safety; child protection; social aspects of cybersecurity.
Chapter 7: Internet safety issues: Objectionable and harmful content; freedom of expression; reliability of information; health, ethics, and gender; and information aggression and openness.
Chapter 8: Policies and strategies: Developed countries; international frameworks: Council of Europe; European Union directives related to data protection and cybersecurity strategy; ITU Draft Initiative on Cybersecurity; Organisation for Security and Cooperation in Europe; business initiatives; SAFECode; Intel and embedded security; importance and risks of public-private co-operation.
‘The course is updated with the latest security issues, so we have a global view of what is going on now, and what organisations are involved at international level in the fight against cybercriminality.’
‘... [the course lecturer] has been very encouraging to think on even the different side which may not be very popular side. So both pros and cons of the issues come to light in the class, encouraging deeper learning.’