Cybersecurity and Cyberwarfare: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
* [[Politics and Technology of Control: Introduction|Jan 24]] | * [[Politics and Technology of Control: Introduction|Jan 24]] | ||
* [[Paradigms for Studying the Internet|Jan 31]] | * [[Paradigms for Studying the Internet|Jan 31]] | ||
* [[New Economic Models|Feb | * [[Regulating Speech Online|Feb 7]] | ||
* [[Peer Production and Collaboration|Feb | * [[New Economic Models|Feb 14]] | ||
* [[ | * [[Peer Production and Collaboration |Feb 21]] | ||
* [[New and Old Media, Participation, and Information | * [[Copyright in Cyberspace |Feb 28]] | ||
* [[New and Old Media, Participation, and Information |Mar 6]] | |||
* Mar 13 - ''No class'' | * Mar 13 - ''No class'' | ||
| | | | ||
* [[ | * [[Collective Action and Decision-making |Mar 20]] | ||
* [[Internet | * [[Internet and Democracy |Mar 27]] | ||
* [[ | * [[Control and Code: Privacy Online |Apr 3]] | ||
* [[ | * [[Internet and Democracy: The Sequel |Apr 10]] | ||
* [[Internet and | * [[Internet Infrastructure and Regulation |Apr 17]] | ||
* [[ | * [[The Wikileaks Case |Apr 24]] | ||
* [[Cybersecurity and Cyberwarfare|May 1]] | * [[Cybersecurity and Cyberwarfare|May 1]] | ||
* [[Final Project|May 8]] - ''No class'' | * [[Final Project|May 8]] - ''No class'' |
Revision as of 08:57, 12 January 2012
May 1
Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?
Readings
- Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security
- Zittrain, The Future of the Internet: And How to Stop It; Chapter 3
- Chatham House Report On Cyberwarfare - Executive Summary
- Wikipedia entry on Stuxnet
Optional Readings
- Whitehouse.gov, Comprehensive National Cybersecurity Initiative, Cyberspace Policy Review
- Jack Goldsmith, The Cyberthreat, Government Network Operations, and the Fourth Amendment
- Jane Holl Lute and Bruce McConnell, Op-Ed: A Civil Perspective on Cybersecurity
- Zittrain, Freedom and Anonymity
- Infoweek, Leaked Cables Indicate Chinese Military Hackers Attacked U.S.
- CNET, Cyber attacks rise at critical infrastructure firms