oWhat makes cyber conflict a particularly important topic of study?
o In what ways is cyberspace analogous to the â€œnaturalâ€ physical domains of land, sea, air, and water? In what ways is it different?
Readings: o Books: Blum, chapters 4-5; Singer, sections beginning on p. 67, 72, 91; Valeriano, chapter 2 o Articles: SANS, Logic Bombs, Trojan Horses, and Trap Doors; Cesare, Online Security Braces for Quantum Revolution, and Schneier, NSA Plans for a Post-Quantum World ï‚· Videos: FBI-produced video on Solar Sunrise, found here: http://www.youtube.com/watch?feature=player_embedded&v=bOr5CtqYnsA, ï‚· Interactive/Internet: Kaspersky Real Time Cyber Threat Map, found here: http://cybermap.kaspersky.com/. ï‚· Learning Activity: In the discussion board, respond to the following:
o Is it possible to know if a CNE attack is intended to simply steal data or if it is reconnaissance in preparation for a CNA-style operation?
o What risk, if any, do breakthroughs in quantum computing, neuromorphic computing, etc. pose to modern cryptography as an effective method to defend against CNE?
plz answer these qs?