Cybersecurity and Cyberwarfare: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
BerkmanSysop (talk | contribs) (UTurn to 1336694399) |
||
(37 intermediate revisions by 14 users not shown) | |||
Line 1: | Line 1: | ||
{{ClassCalendar}} | |||
'''May 1''' | |||
Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together? | |||
<onlyinclude> | <onlyinclude> | ||
== Readings == | == Readings == | ||
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security] | * [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security] | ||
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3] | |||
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary] | |||
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet] | |||
== Optional Readings == | == Optional Readings == | ||
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx | * Whitehouse.gov, [http://www.whitehouse.gov/cybersecurity Comprehensive National Cybersecurity Initiative, Cyberspace Policy Review] | ||
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment] | |||
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity] | |||
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity] | |||
* Infoweek, [http://informationweek.com/news/security/attacks/229401866 Leaked Cables Indicate Chinese Military Hackers Attacked U.S.] | |||
* CNET, [http://news.cnet.com/8301-27080_3-20055091-245.html Cyber attacks rise at critical infrastructure firms] | |||
</onlyinclude> | </onlyinclude> | ||
== Class Discussion == | == Class Discussion == | ||
May 1: Cybersecurity and Cyberwarfare | |||
[[User:Just Johnny|Just Johnny]] 17:14, 15 February 2012 (UTC) | |||
== Links == | == Links == |
Latest revision as of 16:50, 17 January 2013
May 1
Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?
Readings
- Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security
- Zittrain, The Future of the Internet: And How to Stop It; Chapter 3
- Chatham House Report On Cyberwarfare - Executive Summary
- Wikipedia entry on Stuxnet
Optional Readings
- Whitehouse.gov, Comprehensive National Cybersecurity Initiative, Cyberspace Policy Review
- Jack Goldsmith, The Cyberthreat, Government Network Operations, and the Fourth Amendment
- Jane Holl Lute and Bruce McConnell, Op-Ed: A Civil Perspective on Cybersecurity
- Zittrain, Freedom and Anonymity
- Infoweek, Leaked Cables Indicate Chinese Military Hackers Attacked U.S.
- CNET, Cyber attacks rise at critical infrastructure firms
Class Discussion
May 1: Cybersecurity and Cyberwarfare Just Johnny 17:14, 15 February 2012 (UTC)