Topic: Cybersecurity Highlights

Presenting to the Pros: Jackson School Students Research Cyberattack Attribution for Microsoft

July 29, 2017

Posted by: jlbeyer

Jackson School Applied Research Project students at Microsoft

During spring quarter, one of the Jackson School’s Applied Research Program student teams was given a daunting task – help Microsoft think about Brad Smith’s call for a Digital Geneva Convention. In addition to weighing in on current Microsoft strategy, the students found out that they were working on the exact same research task that Microsoft had asked RAND to tackle. The project was the fifth product of a Jackson School Applied Research collaboration with Microsoft’s Global Security Strategy & Diplomacy Team.

North Korea Cyber Attacks: A New Asymmetrical Military Strategy

June 28, 2016

Posted by: jlbeyer

North_Korea_Flag

North Korea has focused on an asymmetric military strategy because of its lack of conventional power and resources. However, its traditional asymmetric weapons and strength have been monitored by Western countries, therefore, heavily sanctioned. For North Korea, developing and exerting its cyber capabilities is the best way to avoid sanctions while achieving its strategic goals. Cyber tactics are effective because of the characteristics of cyberspace or cyber warfare–the low cost of entry, anonymity, and plausible deniability.

China-Russia Cybersecurity Cooperation: Working Towards Cyber-Sovereignty

June 21, 2016

Posted by: jlbeyer

Chinese_keyboard_Mac_Closeup

The closeness of China and Russia’s cybersecurity relationship is not dependent on their ties with each other, but is defined in relation to the US. Instead of augmenting the trust or preventing cyber-espionage between the two countries, Sino-Russian cybersecurity cooperation is a strategic move to challenge US dominance over the Internet.