Cybersecurity and Cyberwarfare: Difference between revisions

From Technologies of Politics and Control
Jump to navigation Jump to search
(UTurn to 1336694399)
 
(34 intermediate revisions by 14 users not shown)
Line 1: Line 1:
<div class="editsection noprint editlink plainlinksneverexpand" align="right" style="float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;">
{{ClassCalendar}}
<big>'''Syllabus'''</big>
 
{| border="0" cellspacing="4" cellpadding="4" style="background:#eeeeff; text-align: left;"
'''May 1'''
|
 
* [[Politics and Technology of Control: Introduction|Jan 25]]
Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together? 
* [[Paradigms for Studying the Internet|Feb 1]]
 
* [[New Economic Models|Feb 8]]
* [[Peer Production and Collaboration|Feb 15]]
* [[Collective Action and Decision-making|Feb 22]]
* [[New and Old Media, Participation, and Information|Mar 1]]
* [[Law's Role in Regulating Online Conduct and Speech|Mar 8]]
* Mar 15 - ''No class''
|
* [[Regulating Speech Online|Mar 22]]
* [[Internet Infrastructure and Regulation|Mar 29]]
* [[Copyright in Cyberspace|Apr 5]]
* [[Control and Code: Privacy Online|Apr 12]]
* [[Internet and Democracy|Apr 19]]
* [[Internet and Democracy: The Sequel|Apr 26]]
* [[Cybersecurity and Cyberwarfare|May 3]]
* [[Final Project|May 10]] - ''No class''
|}
<br clear="right" />
</div>
'''May 3'''


Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together? 
<onlyinclude>
<onlyinclude>
== Readings ==
== Readings ==
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary]
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]


== Optional Readings ==
== Optional Readings ==
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment]
* Whitehouse.gov, [http://www.whitehouse.gov/cybersecurity Comprehensive National Cybersecurity Initiative, Cyberspace Policy Review]
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment]
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity]
* Infoweek, [http://informationweek.com/news/security/attacks/229401866 Leaked Cables Indicate Chinese Military Hackers Attacked U.S.]
* CNET, [http://news.cnet.com/8301-27080_3-20055091-245.html Cyber attacks rise at critical infrastructure firms]
</onlyinclude>
</onlyinclude>
== Class Discussion ==
== Class Discussion ==


* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]
May 1: Cybersecurity and Cyberwarfare
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It's pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC)
[[User:Just Johnny|Just Johnny]] 17:14, 15 February 2012 (UTC)
: Great recommendation.  I've added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)


== Links ==
== Links ==

Latest revision as of 16:50, 17 January 2013

May 1

Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?


Readings

Optional Readings


Class Discussion

May 1: Cybersecurity and Cyberwarfare Just Johnny 17:14, 15 February 2012 (UTC)

Links