Skip Content
Le Moyne Colege
  • Information for
  • Current Students
  • Parents
  • Faculty & Staff
  • Alumni
  • tools
  • About Us
  • Calendar
  • The Arts
  • News
  • Athletics
  • Current Students
  • Parents
  • Faculty & Staff
  • Alumni
  • Always Forward Logo Always Forward Campaign
  • About Us
  • Calendar
  • The Arts
  • News
  • Athletics
Le Moyne
    HOME | Cybersecurity for Future Presidents

    CSC 361 Cybersecurity for Future Presidents

    Future Presidents will need to understand the science, technology, and human considerations behind cyber security well enough to make informed decisions when provided advice and options for action. By adopting the perspective of training future Presidents, this course aims to help all students (whether or not they later seek leadership positions in government or industry) to understand cyber security, privacy, and intellectual property issues from technical and social perspectives. It assumes a basic familiarity with computers including use of modern desktop, mobile and web-based platforms. It is designed for students who have an interest in thinking critically about how technology and cyber security may affect individuals, groups, and organizations in 20-30 years. Government by the people depends on a citizenry that understands the issues their leaders must address. This course will provide students the tools to understand and evaluate the actions of future leaders in the area of cyber security.

    Learning Objectives

    At the end of the course, students should:
    -- Technical Foundations:
    Explain fundamental concepts of computing and cyber security, including information theory, computability, cryptography, authentication, access control, information flow, anonymity, privacy, accountability, how vulnerabilities arise and how attacks work.
    -- Policy Foundations:
    Explain relevant laws, policies, societal and market forces that will continue to shape policy surrounding cyber security and privacy.
    --Critical Thinking:
    Be able to apply their understanding of technology and policy to assess critically arguments put forth in favor of alternative policy positions.

    Methods of Assessment

    Students will be assessed in four ways: through class participation and homework assignments, including participation in classroom debates, (40%), on a mid-term exam (30%) and a final exam (30%).
    Rather than providing extra credit work - we will count the final exam as 40% and the midterm as 20% for any student who does better on their final exam than on their mid-exam. This should incentivize students to learn the materials they missed on the midterm.

    Exercise Late Policy

    Your exercise grade will be deducted a certain percentage based on the following guidelines:
    --10% When submitted after the due date/time BUT before the exercise is reviewed in class.
    --25% when submitted after exercise review in class BUT before exercise solutions posted in Canvas.
    --50% when submitted after exercise solutions posted in Canvas.

    Text Book

    Primary: Kernighan, B. D is for Digital. DisForDigital.net, 2011.
    Supplementary: Anderson, R. Security Engineering. Available at  http://www.cl.cam.ac.uk/~rja14/book.html

    Instructors

    -- Primary Instructor: Carl Landwehr  - landweca@lemoyne.edu
    -- Supporting: Aparna Das - dasa@lemoyne.edu and Dave Voorhees - voorhedp@lemoyne.edu

    Weekly Schedule

    See below for course flow graphic.
    Week Topic Lecture Slides Assignments
    1 Introduction to the course. Where are we today? US Government Organization. PPT | PDF A1
    2 Data Representation. How telephone networks work? Wiretapping history & policy.  PPT | PDF A2
    3 Surveillance policy, Cryptography technology and policy. PPT | PDF A3
    4 Debate #1:Crypto backdoor for LE access PPT | PDF A4
    5 Security Foundations. Privacy policy background PPT | PDF
    A5
    6 How Cyber attacks work. PPT | PDF A6
    7 Debate #2. Right to be forgotten. Midterm review. PPT | PDF A7
    8 Accountability. Intro. to eVoting. PPT | PDF A8
    9 Debate # 3:Internet elections like Estonia. Extra time on Scams, Metcalfe's Law, in-band/out-of-band comms PPT | PDF A9
    10  History of technology and economics of  cybersecurity, genomic privacy background PPT | PDF  A10
    11 Debate #4:commercial genomic databases provide adequate protection. PPT | PDF A11
    12 Anonymity, digital currency, digital currency attempts, bitcoin and blockchain, relevant policy/legislation PPT | PDF A12
    13 Debate #5: Treasury should treat bitcoin as currency, not property. Extra time: financial cybersecurity? PPT | PDF A13
    14 Summation lecture. Issues for future Presidents. Cyberwar, surveillance, big data. Course review & farewell. PPT | PDF Study for final

    Files for Course

    • Syllabus
    • Reading Schedule
    • Debate Instructions
    • Grading Rubrics for Debates
    • Mid-term
    • Final Exams
    • Pre survey  
    • Post survey

     

    NSF Award #1500033 DGE Division of Graduate Education SaTC-EDU: EAGER: INCUBATE - INjecting and assessing Cybersecurity edUcation with little internal suBject mATter Expertise
    • Academic Divisions
    • Athletics
    • Library
    • Academic Calendar
    • Admission Information
    • Programs of Study
    • Work at Le Moyne
    • College Offices
    • Visiting Le Moyne
    • Events Calendar
    • For Students
    • For Faculty & Staff
    • Compliance Information
    • Contact Us
    • Site Map

    Le Moyne is committed to maintaining a safe campus environment. For information about Title IX and assault resources, click below.Learn More

    Stay Connected

    © 2021 Le Moyne College.

    All Rights Reserved. |Map Icon 1419 Salt Springs Road,

    Syracuse, NY 13214


    | (800) 333-4733 | (315) 445-4100

    Non-Discrimination|Contact Us|Privacy Policy