The Changing Internet: Cybersecurity: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{{Ilawsidebar}} | {{Ilawsidebar}} | ||
==Overview== | |||
''Format'': Lecture, featuring guest respondents<br/> | |||
''Lead'': Jonathan Zittrain, featuring Jack Goldsmith<br/> | |||
This module will draw on central themes from the previous day regarding the unique qualities of | |||
the Internet, and the culture and architecture of openness – of protocols, interfaces, and values | |||
– that make it a generative space. What are the threats to this generativity? How do forces like | |||
consumerism, corporate interest, government and other controls, and cybersecurity put the open | |||
Net at risk? Concepts such as cyberwar will be surfaced via case examples, including phenomena | |||
such as Stuxnet and Ghostnet; the role of hackers such as AntiSec, LulzSec, and Anonymous | |||
will also be considered. Jack Goldsmith will offer a turbo talk on the most salient issues in | |||
cybersecurity from a national security and public policy perspective; this will be followed by Q | |||
and A, with audience participation. | |||
==Navigation== | ==Navigation== | ||
[[Category:Pillars of iLaw]] | [[Category:Pillars of iLaw]] |
Revision as of 13:30, 27 July 2011
Overview
Format: Lecture, featuring guest respondents
Lead: Jonathan Zittrain, featuring Jack Goldsmith
This module will draw on central themes from the previous day regarding the unique qualities of the Internet, and the culture and architecture of openness – of protocols, interfaces, and values – that make it a generative space. What are the threats to this generativity? How do forces like consumerism, corporate interest, government and other controls, and cybersecurity put the open Net at risk? Concepts such as cyberwar will be surfaced via case examples, including phenomena such as Stuxnet and Ghostnet; the role of hackers such as AntiSec, LulzSec, and Anonymous will also be considered. Jack Goldsmith will offer a turbo talk on the most salient issues in cybersecurity from a national security and public policy perspective; this will be followed by Q and A, with audience participation.