The Changing Internet: Cybersecurity: Difference between revisions
No edit summary |
|||
Line 38: | Line 38: | ||
==Related Videos== | ==Related Videos== | ||
<videoflash>Jru96K-pYHI</videoflash> | <videoflash>Jru96K-pYHI</videoflash> | ||
* Zittrain anticipates changes to the Internet regarding quality of service, accounting & traffic management, encryption & security, and authentication in 2004. | * Professor Zittrain anticipates changes to the Internet regarding quality of service, accounting & traffic management, encryption & security, and authentication in 2004. | ||
<br> | <br> | ||
<br> | <br> | ||
<videoflash>iI5HzUX6xkk</videoflash> | <videoflash>iI5HzUX6xkk</videoflash> | ||
*Zittrain describes the need for new security measures and potential effects on Internet neutrality. | *Professor Zittrain describes the need for new security measures and potential effects on Internet neutrality. | ||
<br> | <br> | ||
<br> | <br> | ||
<videoflash>QMxFKmGe46g</videoflash> | <videoflash>QMxFKmGe46g</videoflash> | ||
*Zittrain discusses potential changes in hardware and how they will affect control of content. | *Professor Zittrain discusses potential changes in hardware and how they will affect control of content. | ||
<br> | <br> | ||
<br> | <br> | ||
[[Category:Pillars of iLaw]] | [[Category:Pillars of iLaw]] |
Revision as of 13:20, 22 August 2011
Overview
Wednesday, 10:00-11:30am
Format: Lecture, featuring guest respondents
Lead: Jonathan Zittrain, featuring Jack Goldsmith
This module will draw on central themes from the previous day regarding the unique qualities of the Internet, and the culture and architecture of openness – of protocols, interfaces, and values – that make it a generative space. What are the threats to this generativity? How do forces like consumerism, corporate interest, government and other controls, and cybersecurity put the open Net at risk? Concepts such as cyberwar will be surfaced via case examples, including phenomena such as Stuxnet and Ghostnet; the role of hackers such as AntiSec, LulzSec, and Anonymous will also be considered. Jack Goldsmith will offer a turbo talk on the most salient issues in cybersecurity from a national security and public policy perspective; this will be followed by Q&A, with audience participation.
Required Readings
Stuxnet
- Kim Zetter, How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History, July, 2011.
- Michael Gross, “A Declaration of Cyber-War," April, 2011.
Ghostnet
- Information Warfare Monitor, “Tracking GhostNet: Investigating a Cyber Espionage Network,” Report JR02-2009, March, 2009.
Anonymous
- Nate Anderson, “Prolific spokesman for Anonymous leaves the hacker group,” May, 2011.
- The Telegraph, "LulzSec hacking: a timeline," August, 2011.
- Mohammed Haddad, "Interactive timeline: Anonymous," May, 2011.
Recommended Readings
Stuxnet
- John Markoff, “Vast Spy System Loots Computers in 103 Countries,” March, 2009.
- Jeremy Kirk, “GhostNet Cyber Espionage Probe Still Has Loose Ends,” June, 2009.
Ghostnet
- William Broad and David Sanger, “Worm Was Perfect for Sabotaging Centrifuges,” November, 2010.
- William Broad et al, “Israeli Test on Worm Called Crucial in Iran Nuclear Delay,” January, 2011.
- Mike Lennon, "Massive Series of Cyber Attacks Targeting 70+ Global Organizations Uncovered", August, 2011.
Anonymous
- ABC 360 Documentary, Anonymous: Just for the lulz?, July, 2011.
- Peter Bright, “Anonymous speaks: the inside story of the HBGary hack,” February, 2011.
Related Videos
<videoflash>Jru96K-pYHI</videoflash>
- Professor Zittrain anticipates changes to the Internet regarding quality of service, accounting & traffic management, encryption & security, and authentication in 2004.
<videoflash>iI5HzUX6xkk</videoflash>
- Professor Zittrain describes the need for new security measures and potential effects on Internet neutrality.
<videoflash>QMxFKmGe46g</videoflash>
- Professor Zittrain discusses potential changes in hardware and how they will affect control of content.