CYBER SECURITY
Learning Objectives and Outcomes
Summarize information operations techniques used during a historic war or conflict.
Assignment Requirements
Throughout the history of armed conflict, militaries and military leaders have understood the importance of protecting sensitive information. They have also gone to great lengths to obtain the sensitive information of others that may be of strategic or tactical value.
Recommended Resources
- Course textbook
- An Internet search on recent/current conflicts