Welcome, Guest . Login . Türkçe
Where Am I: Ninova / Courses / Institute of Informatics / BLU 626 / Course Informations
 

Course Information

Course Name
Turkish Siber Güvenlik & Siber Savunma Hukuku
English Law of Cyber Security and Cyber Defense
Course Code
BLU 626 Credit Lecture
(hour/week)
Recitation
(hour/week)
Laboratory
(hour/week)
Semester -
3 3 - -
Course Language Turkish
Course Coordinator Mehmet Akif Yazıcı
Mustafa Şenol
Course Objectives 1)This course will address cross-border implications of development and uses of ICTs and the resulting security concerns.
2)It will familiarize the students with international law applicable to cross-border cyber conflict and discuss national security and defense aspects of ICTs.
3)The students will learn to understand how uses of ICTs affect international security and how to resolve relevant issues under international law and policy.
Course Description Network and information security incidents. Legal framework of countering cybercrime Regulation of ICTs. National security law. Problems in national and international cybersecurity and defense. International and regional network and information security regulations. International cyber law and policy development. Application of international law to uses of ICTs: the UN Charter and international cybersecurity. Application of international law to uses of ICTs: the law of state responsibility. International humanitarian law and cyberspace. Non-binding rules in cybersecurity discourse
Course Outcomes The students will learn:
1) Cyber diplomacy
2) Internet Governance
3) Censorship, circumvention tools
4) Confidence-building and deterrence
5) Arms control in cyberspace
6) Applicability of international law in and to cyberspace
7) Countermeasures and sanctions
8) Electronic surveillance and forced disclosure
9) National security and defense law
Pre-requisite(s)
Required Facilities
Other
Textbook
Other References 1) Farwell, JP and Rohozinski, R. (2012). “The New Reality of Cyber War”. Survival: Global Politics and Strategy.
2) Tikk, E. (2010). “Ten Rules for Cyber Security”. Survival: Global Politics and Strategy.
3) Nye, J.S. (2010). “Cyber Power”, Harvard Kennedy School: Belfer Center for Science and International Affairs
4) Ebert, H. and Maurer,T. (2013). “Contested Cyberspace and Rising Powers”. Third World Quarterly.
5) Streltsov, A.A. (2007). “International Information Security: Description and Legal Aspects”. Disarmament Forum.
 
 
Courses . Help . About
Ninova is an ITU Office of Information Technologies Product. © 2024