Contemporary Crises and Conflicts
Informacje ogólne
Kod przedmiotu: | CES-ContempCrisis |
Kod Erasmus / ISCED: | (brak danych) / (brak danych) |
Nazwa przedmiotu: | Contemporary Crises and Conflicts |
Jednostka: | Instytut Studiów Europejskich |
Grupy: | |
Punkty ECTS i inne: |
5.00
|
Język prowadzenia: | angielski |
Zajęcia w cyklu "Semestr zimowy 2023/2024" (zakończony)
Okres: | 2023-10-01 - 2024-01-28 |
Przejdź do planu
PN WYK
WT ŚR CZ PT |
Typ zajęć: |
Wykład, 30 godzin, 25 miejsc
|
|
Koordynatorzy: | Bogdan Klich | |
Prowadzący grup: | Bogdan Klich, Marcin Zubek | |
Lista studentów: | (nie masz dostępu) | |
Zaliczenie: | Przedmiot - Egzamin | |
Sylabus przedmiotu dla studentów rozpoczynających studia od roku akademickiego 19/20 lub później: | ||
Literatura: |
1. Conflict and the cyberspace - legal and practical perspective: * A Framework for Exploring Cybersecurity Policy Options, Mikolic-Torreira, Igor, Ryan Henry, Don Snyder, Sina Beaghley, Stacie L. Pettyjohn, Sarah Harting, Emma Westerman, David A. Shlapak, Megan Bishop, Jenny Oberholtzer, Lauren Skrabala, and Cortney Weinbaum, Santa Monica, CA: RAND Corporation, 2016, https://www.rand.org/pubs/research_reports/RR1700.html * Chapter 3. Everyone can be good [in:] Klimburg, Alexander, The Darkening Web. The War for Cyberspace, NY 2017 * Singer P.W., Friedman Allan, Cybersecurity and cyberwar: what everyone needs to know, Oxford, New York: Oxford University Press 2014. 2. Web War one - Cyberattack on Estonia (2007): * K. Ruus, Cyber War I: Estonia Attacked from Russia, „European Affairs” 2008, Vol. 9, No. 1-2, https://www.europeaninstitute.org/index.php/42-european-affairs/winterspring-2008/67-cyber-war-i-estonia-attacked-from-russia * S. Herzog, Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses, „Journal of Strategic Securit” 2011, Vol. 4, No. 2, s. 49-60. * The 2007 cyber attacks against Estonia [in:] Haataja Samuli, Cyber Attacks and International Law on the Use of Force, The Turn to Information Ethics, Routledge, London 2018 3. Cyberattacks on Ukraine - Notpetya: * Chapter 2: Eternalblue, Eternal War [in:] Clarke, Richard A. and Knake, Robert, The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats, Penguin Publishing Group, 2020. * Andy Greenberg, The Untold Story of NotPetya, the Most Devastating Cyberattack in History, Wired, 08.22.2018, https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ * Maersk CISO, Implementing the Lessons Learned From a Major Cyber Attack, https://www.youtube.com/watch?v=wQ8HIjkEe9o 4. Disinformation and information warfare in the cyberspace - 2016 US Elections: * Select Committee On Intelligence United States Senate On Russian Active Measure;S Campaigns And Interference In The 2016 U.S. Election, Volume 2: Russia's Use Of Social Media With Additional Views, https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume2.pdf * C-SPAN, Russia's Role in Election-Year Hacking, Director of National Intelligence and the heads of the FBI, CIA, and the National Security Agency, https://www.c-span.org/video/?421334-1/senior-intelligence-officials-testify-russia-hacking-activities 5. Cyberattacks on Iranian nuclear programme - Stuxnet: * Zetter Kim, Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Crown Publishers, New York 2014 * Zero Days, 2016, directed by Alex Gibney, http://www.zerodaysfilm.com * E. Groll, The ‘Little Boy’ of Cyberspace, Foreign Policy, 5.06.2016, https://foreignpolicy.com/2016/06/05/the-little-boy-of-cyberspace/ 6. The future of cyber-conflicts: SolarWinds hack and beyond: * Trey Herr, Will Loomis, Emma Schroeder, Stewart Scott, Simon Handler, and Tianjiu Zuo, Broken trust: Lessons from Sunburst, Atlantic Councile, https://www.atlanticcouncil.org/in-depth-research-reports/report/broken-trust-lessons-from-sunburst/ * Science, Cryptographers scramble to protect the internet from attackers armed with quantum computers, https://www.science.org/content/article/cryptographers-scramble-protect-internet-hackers-quantum-computers |
Właścicielem praw autorskich jest Uniwersytet Jagielloński w Krakowie.