Florian J. Egloff: Catalogue data in Autumn Semester 2021 |
Name | Dr. Florian J. Egloff |
Name variants | Florian Egloff Florian J. Egloff |
Address | Schweiz.- u. Int. Sicherheitspol. ETH Zürich, IFW C 25.2 Haldeneggsteig 4 8092 Zürich SWITZERLAND |
florian.egloff@sipo.gess.ethz.ch | |
URL | http://www.css.ethz.ch/en/center/people/florian-egloff.html |
Department | Humanities, Social and Political Sciences |
Relationship | Lecturer |
Number | Title | ECTS | Hours | Lecturers | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
853-0061-00L | Introduction to Cybersecurity Politics | 3 credits | 2G | M. Dunn Cavelty, F. J. Egloff | |||||||||||||||||||||||||||||||||||
Abstract | The lecture is an introduction to global cybersecurity politics. The focus is on the strategic use of cyberspace by state and non-state actors (threats) and different answers to these new challenges (countermeasures). | ||||||||||||||||||||||||||||||||||||||
Learning objective | Participants learn to assess the advantages and disadvantages of cyberspace as a domain for strategic military operations. They understand the technical basics of cyber operations and know how technology and politics are interlinked in this area. They understand the security challenges for and the motivations of states to be active in cyberspace offensively and defensively and they are familiar with the consequences for international politics. | ||||||||||||||||||||||||||||||||||||||
Content | We start with an overview of cybersecurity issue from 1980 to today and look at events and actors responsible for turning cybersecurity matters into a security political issue with top priority. After familiarizing ourselves with the technical basics, we look at different forms of cyberviolence and trends in cyber conflicts (technique in social and political practice). Then, we turn to countermeasures: we compare national cybersecurity strategies, examine international norms building, and scrutinize concepts such as cyber-power and cyber-deterrence (technique in social and political regulartory contexts). | ||||||||||||||||||||||||||||||||||||||
Lecture notes | A script with background information and comments on the literature will be made available at the beginning of the semester. | ||||||||||||||||||||||||||||||||||||||
Literature | Literature for each session will be available on Moodle. | ||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | The lecture is being supported by a website on Moodle. | ||||||||||||||||||||||||||||||||||||||
Competencies |
|