VIETNAM NATIONAL UNIVERSITY - HCM SOCIALIST REPUBLIC OF VIETNAM
UNIVERSITY OF ECONOMICS AND LAW Independence – Freedom - Happiness
COURSE SYLLABUS
1. Course Information:
- Course name: The Cyber Threat and Globalization
- Course code: COM1306
- Credits: 3 credtits
o Theory: 45 lectures
- Faculty: International Economic Relations
- Required course:
- Prerequisite:
- Parallel course:
- Other requirements (knowledge/ skill/ attitude):
2. Lecturer information:
Name: Nguyen Quang Hung
Email: [email protected]
3. Course description:
The course is designed for students to study the nature and the existential threat of
today's information war. It explains the concepts, as well describes the threats
posed to people by disgruntled individuals, attackers, criminals, terrorists and
hostile forces. The course also equips the basics of safety and security
information, basic types of network security attacks and incidents, methods for
preventing, detecting, and responding to incidents and attacks.
4. Course objective
Overal objective:
Students of international relations who want a better grasp of the nature and
existential threat of today’s information wars, in addressing the paradigm shift in
national security and global conflict.
Detailed objective:
- Knowledge:
G1. Understand the basic knowledge about security
G2. Understand the relevant concepts as well as structural challenges and
responsibilities with which policy makers struggle must work.
G3. Increase the level of understanding of students who are concerned about cyber
threats and their impact on society, including at the level of daily routines.
G4. Have a better understanding of the complex nature of the morphing cyber threat
as it relates to national security, commerce, and the everyday things.
G5. Applying information safety quality management rules
1
- Skills:
G6. Update knowledge and information in the field of security
G7. Working with different types of partnerships
- Attitude:
G8. Honest in the work
5. Learning outcomes:
Course Learning
Number Description
objectives outcomes
Knowledge
LO1 Understand user security practices G1 4.2.6
LO2 Understand the need for security of G1 2.3.1
information
LO3 Understand the relevant concepts as well as G2 1.2.2
structural challenges and responsibilities
LO4 Increase the level of understanding about G3 1.2.6
cyber threats and their impact on society
LO5 Have a better understanding of the complex G4 4.6.1
nature of the morphing cyber threat
LO6 Understand the information security quality G5 1.1.6
management rules
Skills
LO7 Update new knowledge about information G6 4.6.4
security
LO8 Teamwork in multinational corporation G7 3.1.1
LO9 Working with groups of different cultures G7 3.1.5
Attitude
LO10 Honest in the work G8 2.5.1
6. Course details:
Chapter Details Lectures Notes
Chapter 1: User 1.1. Safe Computer Setup Lecture:3
information security 1.2. Information security when using wireless
network
1.3. Malware prevention
1.4. Identify and prevent spam, phishing, and
spam messages
1.5. Use safe social networks
Chapter 2: Defining 2.1. A World at War with Itself Lecture: 6
Cyberspace 2.2. What, Then, Is Cyber?
2.3. The History of the Internet
2
2.4. Unfettered Growth and Challenges
2.5. Information Technology versus
Operational Technology
2.6. Vulnerabilities
2.7. The Internet of Things (IoT)
2.8. Cloud Computing
2.9. A Two-Edged Sword
2.10. The Next-Generation Internet (IPv6)
2.11. Cybersecurity
2.12. Overview of the Attack Matrix
Chapter 3: The 3.1. What Is Cryptology? Lecture: 6
Mutable Domain 3.2. Exploiting the System
3.3. The Onion Router (TOR)
3.4. Attackers, Facilitators, Defenders, and
Targets
3.5. Malware
3.6. Cryptocurrencies
3.7. Advanced Persistent Threat (APT)
3.8. The Deep and Dark Webs
3.9. The Lexicon of Cyber Conflict
Chapter 4: Global 4.1. The Globalization Process Lecture: 6
Cyber Risk and 4.2. Motives and Sources of Attack
4.3. Policy Lagging Technology
Access Vectors 4.4. The “Sordid Boon” of Social Media
4.5. Algorithms, Software, Audience
Mapping, and Targeted Messaging
4.6. “Swarmcasting”—Terrorists, Protesters,
and Hired Guns
4.7. “Psyber Warfare”
4.8. Broadband Mobility
Chapter 5: Violent 5.1. Definitions Lecture: 6
Extremist 5.2. A Spectrum of Cyber-Enabled Terrorist
Operations
Organizations and 5.3. Cyber-Enabled Recruitment and
Terrorism in the Radicalization
Cyber Domain 5.4. Phases of Internet Radicalization
5.5. Planning, Command, Control, and
Communications
5.6. Armed Attack
5.7. Cyber Target: Industrial Control Systems
5.8. “Psyber Operations”
5.9. A Hypothetical Case of Strategic
Cyberterrorism
Chapter 6: Public- 6.1. The Information Society: An Emerging Lecture: 6
Private Partnerships Societal Construct
6.2. A Global Culture of Cyber Security for
the Information Society
6.3. World Summit on the Information
Society and Internet Governance Forum
3
6.4. The Perils of Private Ordering: Network
Effects, Trust, and Community Harm
Chapter 7: Cyber 7.1. Big Data Lecture: 6
Horizons 7.2. Artificial Intelligence
7.3. Robotics and AI
7.4. Machine Learning
7.5. Third Offset Strategy
7.6. Distributed Ledger Technology
Chapter 8: Risk, 8.1. Risk Management and Information Lecture: 6
Response, and Security
Recovery 8.2. The Risk Management Process
8.3. Business Continuity Management
8.4. Backing Up Data and Applications
8.5. Incident Handling
8.6. Recovery from a Disaster
7. References
Course books:
[GT1] Jack A. Jarmon and Pano Yannakogeorgos (2018), The Cyber Threat and
Globalization, Rowman & Littlefield
[GT2] Wiley David Kim and Michael G. Solomon (2016), Fundamentals of Information
Systems Security: 3rd, Jones & Bartlett Learning
[GT3] Lecture slides
References: Instructor reference files
8. Teaching methods
- Active lecturer
- Teaching with videos
- Teamwork
- Problem-based and case study
- Brainstorming
9. Assessment
Details Symbol Ratio Note
1. Review process 50%
a. Course project ĐG1 30 % Group project reports
b. Exercises on class ĐG2 Average score of the exercises that are
20 %
required to do in class
2. Midterm review 20%
Individual test ĐG3 20% Quiz test
4
3. Final review ĐG4 Essay test
30%
Individual test
Total 100%
❖ Rubric (ĐG1)
Criterion/Point 9-10 7-8 5-6 <4
Content (60%) Full upon Incomplete as Missing over
Full upon
request. required 50% as
request
Exactly Relatively required
Exactly
Have a good idea accurate Low accuracy
Logic
Some places No logic and
Structure, Logic There are still
are not logical structure is not
layout (15%) Structure is clear some unclear
and unclear clear
places
Present There are a
Present correctly There were
correctly in few small
in the required many
the required errors in
format. formatting and
format formatting
Appearance Beautiful form. spelling errors
There are and spelling
(10%) There are There are no
citations and Quoting and
citations and citations and
references butlisting of
complete references
not sketchy
references listed listed
exhaustive references
The report is Sketchy group
The content incomplete, work report, no
Full group
of the group does not implementation
Group work working report
work report specify the content, and
report (15%) in the required
was missing a contribution contribution
form
few items content of rate for each
each member member
5
10. Teaching activities:
Time Content Teaching Detailed activities Material Assessment Learning
methods Lecturer Student outcomes
Week 1 1.1. Safe Computer Setup Proactive Teaching Listen, take notes [GT3] LO1
1.2. Information security teaching
when using wireless network Tutorial Think and answer
1.3. Malware prevention Q&A
1.4. Identify and prevent Ask and call Grouping
spam, phishing, and spam randomly or
messages volunteer to
1.5. Use safe social networks answer
Week 2 2.1. A World at War with Proactive Teaching Listen, take notes [GT1] chapter LO2
Itself teaching 1
2.3. What, Then, Is Cyber? Tutorial Think and answer
2.3. The History of the Q&A
Internet Ask and call Discuss
2.4. Unfettered Growth and Discussion randomly or
Challenges groups volunteer to Record content
2.5. Information Technology answer discussion and
versus Operational present
Technology Request discussion
2.6. Vulnerabilities groups
Week 3 2.7. The Internet of Things Proactive Teaching Listen, take notes [GT1] chapter LO2
(IoT) teaching 1
2.8. Cloud Computing Tutorial Think and answer
2.9. A Two-Edged Sword Q&A
2.10. The Next-Generation Ask and call Discuss
Internet (IPv6) randomly or
6
2.11. Cybersecurity Discussion volunteer to Record content
2.12. Overview of the Attack groups answer discussion and
Matrix present
Request discussion
groups
Week 4 3.1. What Is Cryptology? Proactive Teaching Listen, take notes [GT1] chapter LO3
3.2. Exploiting the System teaching 2
3.3. The Onion Router Tutorial Think and answer
(TOR) Q&A
3.4. Attackers, Facilitators, Ask and call Discuss
Defenders, and Targets Discussion randomly or
groups volunteer to Record content
answer discussion and
present
Request discussion
groups
Week 5 3.5. Malware Proactive Teaching Listen, take notes [GT1] chapter LO3
3.6. Cryptocurrencies teaching 2
3.7. Advanced Persistent Tutorial Think and answer
Threat (APT) Q&A
3.8. The Deep and Dark Ask and call Discuss
Webs Discussion randomly or
3.9. The Lexicon of Cyber groups volunteer to Record content
Conflict answer discussion and
present
Request discussion
groups
Week 6 4.1. The Globalization Proactive Teaching Listen, take notes [GT1] chapter LO4
Process teaching 3
Tutorial Think and answer
7
4.2. Motives and Sources of Q&A
Attack Ask and call Discuss
4.3. Policy Lagging Discussion randomly or
Technology groups volunteer to Record content
4.4. The “Sordid Boon” of answer discussion and
Social Media present
Request discussion
groups
Week 7 4.5. Algorithms, Software, Proactive Teaching Listen, take notes [GT1] chapter LO4
Audience Mapping, and teaching 3
Targeted Messaging Tutorial Think and answer
4.6. “Swarmcasting”— Q&A
Terrorists, Protesters, and Ask and call Discuss
Hired Guns Discussion randomly or
4.7. “Psyber Warfare” groups volunteer to Record content
4.8. Broadband Mobility answer discussion and
present
Request discussion
groups
Week 8 5.1. Definitions Proactive Teaching Listen, take notes [GT1] chapter 6 LO5
5.2. A Spectrum of Cyber- teaching
Enabled Terrorist Operations Tutorial Think and answer
5.3. Cyber-Enabled Q&A
Recruitment and Ask and call Discuss
Radicalization Discussion randomly or
5.4. Phases of Internet groups volunteer to Record content
Radicalization answer discussion and
present
Request discussion
groups
8
Week 9 5.5. Planning, Command, Proactive Teaching Listen, take notes [GT1] chapter LO5
Control, and teaching 6
Communications Tutorial Think and answer
5.6. Armed Attack Q&A
5.7. Cyber Target: Industrial Ask and call Discuss
Control Systems Discussion randomly or
5.8. “Psyber Operations” groups volunteer to Record content
5.9. A Hypothetical Case of answer discussion and
Strategic Cyberterrorism present
Request discussion
groups
Week 10 6.1. The Information Proactive Teaching Listen, take notes [GT1] chapter 7 LO8,
Society: An Emerging teaching LO9
Societal Construct Tutorial Think and answer
6.2. A Global Culture of Q&A
Cyber Security for the Ask and call Discuss
Information Society Discussion randomly or
groups volunteer to Record content
answer discussion and
present
Request discussion
groups
Week 11 6.3. World Summit on the Proactive Teaching Listen, take notes [GT1] chapter 7 LO8,
Information Society and teaching LO9
Internet Governance Forum Tutorial Think and answer
6.4. The Perils of Private Q&A
Ordering: Network Effects, Ask and call Discuss
Trust, and Community Harm Discussion randomly or
groups volunteer to
answer
9
Record content
Request discussion discussion and
groups present
Week 12 7.1. Big Data Proactive Teaching Listen, take notes [GT1] chapter 8 LO7
7.2. Artificial Intelligence teaching
7.3. Robotics and AI Tutorial Think and answer
Q&A
Ask and call Discuss
Discussion randomly or
groups volunteer to Record content
answer discussion and
present
Request discussion
groups
Week 13 7.4. Machine Learning Proactive Teaching Listen, take notes [GT1] chapter 8 LO7
7.5. Third Offset Strategy teaching
7.6. Distributed Ledger Tutorial Think and answer
Technology Q&A
Ask and call Discuss
Discussion randomly or
groups volunteer to Record content
answer discussion and
present
Request discussion
groups
Week 14 8.1. Risk Management and Proactive Teaching Listen, take notes [GT2] chapter 8 LO6,
Information Security teaching LO10
8.2. The Risk Management Tutorial Think and answer
Q&A
Process
Discuss
10
8.3. Business Continuity Discussion Ask and call
Management groups randomly or Record content
volunteer to discussion and
answer present
Request discussion
groups
Week 15 8.4. Backing Up Data and Proactive Teaching Listen, take notes [GT2] chapter 8 LO6,
Applications teaching LO10
8.5. Incident Handling Tutorial Think and answer
Q&A
8.6. Recovery from a
Ask and call Discuss
Disaster
Discussion randomly or
groups volunteer to Record content
answer discussion and
present
Request discussion
groups
11
11. Rules:
- Prepare lesson before class
- Bring textbooks, slides and practice to class
- The phone is put on vibrate in the classroom
12. Appendix - Course Learning Outcomes:
Learning Outcome Content of Learning Outcome
Analyze the impact of the business environment, understand the
1.1.6 management process and apply in real situations
Applying knowledge of economic law to explain and solve legal
1.2.2 problems in business
1.2.6 Applying knowledge of communication in business activities
2.3.1 Use systems thinking to solve problems
2.5.1 Having professional ethics, honesty and social responsibility
3.1.1 Form an effective group
3.1.5 Working with different types of groups
4.2.6 Application of information technology
4.6.1 Identify the constraints when developing the project
4.6.4 Knowledge accumulation and sharing
12