Examine the societal and organizational impacts of cybersecurity policy in our interconnected world that is increasingly dependent on advanced technologies and systems for communications and control. Explore the components of information systems and control systems and review the history and development of cybersecurity. Gain an appreciation of policy as one tool for managing risk, and start to consider the challenges of cybersecurity policy-making.
With successful completion of this course, students are able to: 1. Identify and explain significant cybersecurity policy concerns within the historical context of computing, the internet, and globalization. 2. Express common vulnerabilities and threats in non-technical language that conveys the organizational complexity of cybersecurity risk management. 3. Articulate the value of cybersecurity to an organization’s success (functionality/efficiency, competitive advantage, fulfillment of mission, etc.) as well as challenges to implementation. 4. Explain and give examples of the cybersecurity impact of interconnections and dependencies within organizations, industries/sectors, and the homeland security enterprise. 5. Describe the breadth of the communities of interest focused on detecting vulnerabilities and threats and mitigating cybersecurity risks.