Cybersecurity and Cyberwarfare: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
Line 29: | Line 29: | ||
== Readings == | == Readings == | ||
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security] | * [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security] | ||
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3] | |||
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet] | |||
== Optional Readings == | == Optional Readings == |
Revision as of 18:48, 10 February 2011
May 3
Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?
Readings
- Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security
- Zittrain, The Future of the Internet: And How to Stop It; Chapter 3
- Wikipedia entry on Stuxnet
Optional Readings
Class Discussion
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It's pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --Jastify 22:55, 31 January 2011 (UTC)