This page highlights four structured policy analysis papers I completed for CYSE 425W: Cybersecurity Strategy and Policy. Each paper explores different aspects of a selected cybersecurity policy — “Hacking Back” as a method of digital self-defense — by examining its definition, political implications, ethical considerations, and social impacts. Together, these papers demonstrate my ability to research cybersecurity strategies, apply critical analysis, and evaluate cybersecurity policies from multiple professional perspectives.


Paper 1 – Overview of Digital Self-Defense: Hacking Back

This paper provides an overview of hacking back as a cybersecurity strategy. It explains why the policy was developed, how it is implemented, and how it fits within national and international cybersecurity frameworks. The analysis includes references to scholarly sources discussing the advantages and challenges of adopting hacking-back strategies.


Policy-Analysis-Paper-1_CYSE-425W_Wilhelm


Paper 2 – Political Implications of Hacking Back

This paper analyzes the political ramifications associated with hacking-back policies. It examines how lawmakers and policymakers have responded to the strategy, the reasons behind their positions, and the outcomes of political decisions regarding the legality and risks of hacking back.


Policy-Analysis-Paper-2_CYSE-425W_Wilhelm


Paper 3 – Ethical Implications of Hacking Back

This paper explores the ethical debates surrounding hacking back as a cybersecurity defense strategy. It discusses the costs and benefits, evaluates how individual rights are affected, and questions whether the strategy appropriately balances security needs with ethical concerns.


Policy-Analysis-Paper-3_CYSE-425W_Wilhelm


Paper 4 – Social Implications of Hacking Back

This paper examines the societal factors that influenced the development of hacking-back policies and the social consequences of implementing them. It highlights how cultural attitudes toward cybersecurity and retaliation have shaped public acceptance and regulatory challenges around digital self-defense strategies.


Policy-Analysis-Paper-4_CYSE-425W_Wilhelm