While cloud service providers promise you the world of increased security, scalability, and a seemingly endless number of features, those who have actually worked on the systems can attest to the horrors of attempting to secure them; however, by use of threat modeling, this often-daunting task can be […]
Since this week’s readings discussed ethical, legal, illegal, and morally defensible actions in cyberspace, I thought I would discuss the theory of the common good approach and how it applies to cybersecurity; this topic is interesting as many world leaders and the general public do not quite understand […]
This week I want to discuss Carnegie Endowment for International Peace’s article, Cyberspace and Geopolitics: Assessing Global Cybersecurity Norm Processes at a Crossroads. In the article, several weaknesses of the current ‘cyber norm’ were discussed, including lack of transparency regarding state behavior (inability to measure norms), lack of […]
You must be logged in to post a comment.