oWhat makes cyber conflict a particularly important topic of study? o In what ways is cyberspace analogous to the “natural” physical domains
of land, sea, air, and water? In what ways is it different? Readings:
o Books: Blum, chapters 4-5; Singer, sections beginning on p. 67, 72, 91;
Valeriano, chapter 2
o Articles: SANS, Logic Bombs, Trojan Horses, and Trap Doors; Cesare,
Online Security Braces for Quantum Revolution, and Schneier, NSA
Plans for a Post-Quantum World
 Videos: FBI-produced video on Solar Sunrise, found here:
http://www.youtube.com/watch?feature=player_embedded&v=bOr5CtqYnsA,
 Interactive/Internet: Kaspersky Real Time Cyber Threat Map, found here:
http://cybermap.kaspersky.com/.
 Learning Activity: In the discussion board, respond to the following: o Is it possible to know if a CNE attack is intended to simply steal data or if
it is reconnaissance in preparation for a CNA-style operation? o What risk, if any, do breakthroughs in quantum computing, neuromorphic
computing, etc. pose to modern cryptography as an effective method to
defend against CNE? plz answer these qs?