What You Need to Know Before
You Start

Starts 5 June 2025 15:18

Ends 5 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

(UPI) Chapter 8: Cybersecurity of Critical Infrastructure Course (How To)

34-minute College Credit course: In this chapter, the analysis centers on the cybersecurity of critical infrastructure within the national security...
via Treehouse

23 Courses


34 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Free Trial Available

Optional upgrade avallable

Overview

In this chapter, the analysis centers on the cybersecurity of critical infrastructure within the national security domain, examining both the ethical challenges and value conflicts that arise when protecting vital public services and systems from cyber threats. The chapter reviews relevant literature, presents frameworks for categorizing attacks, and discusses real-world case studies to illustrate the complex trade-offs between security and other societal values such as privacy, equity, and long-term stability.

Syllabus

  • Introduction to Cybersecurity of Critical Infrastructure
  • Definition and Importance
    Overview of Critical Infrastructure Sectors
    National Security Implications
  • Ethical Challenges in Cybersecurity
  • Privacy vs. Security
    Equity in Access and Protection
    Balancing Short-term and Long-term Stability
  • Literature Review
  • Key Texts and Their Contributions
    Historical Context and Evolution of Thought
    Trends and Emerging Themes
  • Frameworks for Categorizing Cyber Attacks
  • Types of Cyber Threats to Critical Infrastructure
    Physical, Cyber, and Logical Attacks
    Impact Assessment Models
    Risk Management Approaches
  • Real-World Case Studies
  • Analysis of Notable Cyber Attacks on Critical Infrastructure
    Case Study 1: Stuxnet
    Case Study 2: Ukraine Power Grid Hack
    Lessons Learned
    Mitigation Strategies Employed
  • Trade-offs Between Security and Societal Values
  • Discussion on Privacy Concerns
    Addressing Ethical Value Conflicts
    Policy Implications and Decision-Making
  • Conclusion and Future Directions
  • Summary of Key Points
    Areas for Further Research
    Anticipated Challenges and Innovations in the Field

Subjects

Information Security (InfoSec)