This module is a resource for lecturers

Exercises

This section contains material that is meant to support lecturers and provide ideas for interactive discussions and case-based analysis of the topic under consideration.

Exercise # 1 Internet Principles

Consider the following five Internet principles: freedom, openness, interoperability, security, and resiliency.

Assign students to research the national cybersecurity strategy of their country before class. Students should come prepared to discuss the answers to the below questions in class.

Discussion Questions

  • Are these principles included in the national cybersecurity strategy? If so, which ones? If not, what is missing and why?
  • Are there any other principles included the national cybersecurity strategy? If so, which ones and why might these have these been included?

Exercise # 2 National Cybersecurity Strategies

Students should be randomly assigned a country before class. Instruct students to research the national cybersecurity strategy of their assigned country before class. Students should come prepared to discuss the answers to the below questions in class.

Discussion Questions

  • What are the objectives, priority actions, expected outcomes, and evaluation mechanisms included in the strategy?
  • Does the country have an action plan?

Exercise # 3 Group Exercise Global Cybersecurity Index

Students should be randomly assigned to a group before the class to enable them to complete the assignment before the class meets. Each group should be randomly assigned one country.

Task the students to conduct research on their country and identify their assigned country's Global Cybersecurity Index score in each of the five pillars (i.e., legal, technical, organizational, capacity-building, and cooperation).

Discussions Questions

  • What were the GCI scores of the assigned country on the legal, technical, organizational, capacity-building, and cooperation pillars?
  • Why did the country receive these scores?
  • What could the country do to improve its cybersecurity posture?
Next: Possible class structure
Back to top