Cybersecurity and Cyberwarfare: Difference between revisions
Jump to navigation
Jump to search
BerkmanSysop (talk | contribs) (UTurn to 1303516799) |
|||
(8 intermediate revisions by 6 users not shown) | |||
Line 25: | Line 25: | ||
'''May 3''' | '''May 3''' | ||
Cybersecurity has been identified as one of the greatest | Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together? | ||
<onlyinclude> | <onlyinclude> | ||
== Readings == | == Readings == | ||
Line 36: | Line 34: | ||
== Optional Readings == | == Optional Readings == | ||
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment] | * Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment] | ||
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity] | * Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity] | ||
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity] | * Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity] | ||
</onlyinclude> | </onlyinclude> | ||
Line 47: | Line 42: | ||
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare] | * [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare] | ||
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It's pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User: | A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It's pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC) | ||
: Great recommendation. I've added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC) | |||
Great recommendation. I've added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February | |||
== Links == | == Links == | ||
Latest revision as of 16:58, 17 January 2013
May 3
Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?
Readings
- Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security
- Zittrain, The Future of the Internet: And How to Stop It; Chapter 3
- Chatham House Report On Cyberwarfare - Executive Summary
- Wikipedia entry on Stuxnet
Optional Readings
- Jack Goldsmith, The Cyberthreat, Government Network Operations, and the Fourth Amendment
- Jane Holl Lute and Bruce McConnell, Op-Ed: A Civil Perspective on Cybersecurity
- Zittrain, Freedom and Anonymity
Class Discussion
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It's pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --Jastify 22:55, 31 January 2011 (UTC)
- Great recommendation. I've added the executive summary to the required readings list. --Dardia 23:50, 10 February 2011 (UTC)