Law 832 /IST 728: Cyber Security Law and Policy
Fall Term 2018
Syracuse University College of Law
Syracuse, New York, USA

This is the new constantly up-dating version of the working syllabus. Click on any subtopic for a full page about that lesson, including assignments.

Lesson & Date Topics
1. Introduction & terminology
1 on 08/22/18 1.a Nature of cyberspace
2 on Aug. 22 1.b. Technical aspects of threats and vulnerabilities
3 on Aug. 27 1.c Categories of actors who pose threats
   
2. The private sector role in securing cyberspace
4 on Aug. 29 2.a. Internet technical standards and governance institutions
5 on Sept. 5 2.b. Private / corporate networks and service providers
   
3. National governments and their role in securing cyberspace
6 on Sept. 10

3.a. The Role of Nation States in Securing Cyber Space

3.b. Implementation mechanisms & intermediaries

7 on Sept. 12

3.c. Legal basis of US statutes affecting cyberspace

3.d. Case study of US attempts to use criminal law

8 on Sept. 17 3.e. Case study of a US attempts to use civil law to affect conduct in cyberspace
9 on Sept. 19 3.f. Case study of a US attempts to use administrative law to affect conduct in cyberspace
   
4. International law's role in securing cyberspace
10 on Sept. 24

4.a. Sources and Nature of International Law

4.a.i. Treaties (e.g. Budapest Convention and MLATs

4.a.ii Customary International Law

11 on Sept. 26 4.b. Law of Armed Conflict, customary international law
12 on October 1 4.c. International politics and International Internet governance
[Class did not meet as originally scheduled on 10/4/18.]
 
5. Privacy, surveillance and the law
13 on October 8 5.a. A Fourth Amendment primer
14 on Oct. 10 5.b. CALEA, Lawful Intercept on the Internet, and Bug Bounties
16 on Oct. 17 5.d. Espionage, Surveillance and Snowden: Same as it Ever Was?
15 on Oct. 15 5.c. Statutory Protections (ECPA, Patriot Act, FISA and FISAA)
17 on Oct. 22 DEBATE
   
6. Cyber War and Strategy
18 online 6.a. Is cyber a military domain?
19 on Oct. 24 6.b. Offensive Information Operations
20 on Oct. 29 6.c. Exploits as weapons, Zero-Day Exploits (ZDEs), Markets for ZDEs
21 on Oct. 31 6.d. Case study of US-China interactions
   
7. Authentication, Identity, and Data Protection
22 on Nov. 5 7.a. Whois v. GDPR and Directory Services; NSTIC
23 on Nov. 7 7.b. National ID cards, Real Names policies
24 on Nov. 12 7.c. Ethical and political issues of anonymity online
25 on Nov. 14 7.d. Crypto regulation, and cryptocurrencies/blockchain, and SmartĀ  Contracts
   
8. Current legislative and policy initiatives
26 on Nov. 26 8.a. Overview of International cybersecurity initiatives
27 on Nov. 28 8.b. Current legislative and policy initiatives
28 on Dec. 3 In-class Presentations by LAW 832 students.
29 on Dec. 5 In-class Presentations by IST 728 students.

 

Revised 10/29/18.

 

 

Recent Additions

Staff Directory

Connect with us