Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (2)
- Computer Sciences (2)
- Information Security (2)
- Internet Law (2)
- Law (2)
-
- Physical Sciences and Mathematics (2)
- Political Science (2)
- Public Affairs, Public Policy and Public Administration (2)
- Science and Technology Law (2)
- Science and Technology Studies (2)
- Social and Behavioral Sciences (2)
- American Politics (1)
- Communication (1)
- Communication Technology and New Media (1)
- Communications Law (1)
- Computer and Systems Architecture (1)
- Data Storage Systems (1)
- Databases and Information Systems (1)
- Defense and Security Studies (1)
- Digital Communications and Networking (1)
- Electrical and Computer Engineering (1)
- Emergency and Disaster Management (1)
- Infrastructure (1)
- Intellectual Property Law (1)
- International Relations (1)
- Military and Veterans Studies (1)
- Military, War, and Peace (1)
- National Security Law (1)
- Institution
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Information Science Faculty Publications
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …