Cybersecurity and Computer Crimes
Jump to navigation
Jump to search
March 31
Last week we looked at hacking as a form of social protest. This week, we take a closer look at the more sinister side of hacking, and the various responses to it. Hacking at its heart involves modifying or intruding upon another’s system. But not all intrusion is socially harmful, and writing laws against hacking have a troubling (and at times, tragic) history of being misused. How big a threat is hacking, really? How should systems respond to hacking? What, if anything, should be the role of government? In what ways can we govern those who don’t consider code to be a governing influence?
Assignment 3
Assignment 3 is due before class today. You can upload that here.
Readings
- Cybersecurity
- Brian Krebs, "The Scrap Value of a Hacked PC (infographic)," Oct 2012
- Bill Hardekopf, "The Big Data Breaches of 2014, Forbes, January 13, 2015
- Liana Baker and Jim Finkle, "Sony Playstation suffers massive data breach," Reuters, April 26, 2011
- Sean Gallagher, "Hackers Promise 'Christmas Present' Sony Pictures Won't Like," Ars Technica, December 15, 2015
- Peter Bright, "US Government Fingers North Korea as the Sony Hackers," Ars Technica, December 17 2014
- Computer Crimes
- United States Department of Justice, Prosecuting Computer Crimes (read pages 1-11: Introduction to the Computer Fraud and Abuse Act and Key Definitions)
- Case studies
Optional Readings
- Intelligence Squared Debate: "The Cyberwar Threat Has Been Grossly Exaggerated" (an Oxford-style debate with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain; watch the video of the debate)
Videos Watched in Class
Links
Class Discussion
Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Andy 10:28, 17 December 2013 (EST)