CYBER SECURITY

Learning Objectives and Outcomes

Summarize information operations techniques used during a historic war or conflict.

Assignment Requirements

Throughout the history of armed conflict, militaries and military leaders have understood the importance of protecting sensitive information. They have also gone to great lengths to obtain the sensitive information of others that may be of strategic or tactical value.

Recommended Resources

  • Course textbook
  • An Internet search on recent/current conflicts