The Changing Internet: Cybersecurity: Difference between revisions

From Internet Law Program 2011
Jump to navigation Jump to search
No edit summary
Line 21: Line 21:
*The Telegraph, [http://www.telegraph.co.uk/technology/news/8674755/LulzSec-hacking-a-timeline.html "LulzSec hacking: a timeline,"] August, 2011.
*The Telegraph, [http://www.telegraph.co.uk/technology/news/8674755/LulzSec-hacking-a-timeline.html "LulzSec hacking: a timeline,"] August, 2011.
*Mohammed Haddad, [http://english.aljazeera.net/indepth/interactive/2011/05/2011519182744550587.html "Interactive timeline: Anonymous,"] May, 2011.
*Mohammed Haddad, [http://english.aljazeera.net/indepth/interactive/2011/05/2011519182744550587.html "Interactive timeline: Anonymous,"] May, 2011.
===Cybersecurity and the Generative Dilemma===
* [http://yupnet.org/zittrain/archives/11 Chapter 3], ''The Future of the Internet'' (also available in [http://futureoftheinternet.org/static/ZittrainTheFutureoftheInternet.pdf#page=48 PDF])


==Recommended Readings==
==Recommended Readings==

Revision as of 11:10, 23 August 2011

iLaw Wiki Navigation
Pillar Themes of iLaw
Open Systems/Access · Online Liberty and FOE
The Changing Internet: Cybersecurity · Intellectual Property
Digital Humanities · Cooperation · Privacy
Cross-sectional Themes of iLaw
The History of the Internet
The Global Internet · Interoperability
The Study of the Internet: New Methods for New Technologies
The Future of the Internet
Case Studies
Digital Libraries, Archives, and Rights Registries
Exploring the Arab Spring · Minds for Sale
User Innovation · Mutual Aid
Misc
Program Schedule · Program Logistics
Evening Events · Student Projects · Participation
Old iLaw Videos · Mid-Point Check-in

Overview

Wednesday, 10:00-11:30am
Format: Lecture, featuring guest respondents
Lead: Jonathan Zittrain, featuring Jack Goldsmith

This module will draw on central themes from the previous day regarding the unique qualities of the Internet, and the culture and architecture of openness – of protocols, interfaces, and values – that make it a generative space. What are the threats to this generativity? How do forces like consumerism, corporate interest, government and other controls, and cybersecurity put the open Net at risk? Concepts such as cyberwar will be surfaced via case examples, including phenomena such as Stuxnet and Ghostnet; the role of hackers such as AntiSec, LulzSec, and Anonymous will also be considered. Jack Goldsmith will offer a turbo talk on the most salient issues in cybersecurity from a national security and public policy perspective; this will be followed by Q&A, with audience participation.

Required Readings

Stuxnet

Ghostnet

Anonymous

Cybersecurity and the Generative Dilemma

  • Chapter 3, The Future of the Internet (also available in PDF)

Recommended Readings

Stuxnet

Ghostnet

Anonymous

Related Videos

<videoflash>Jru96K-pYHI</videoflash>

  • Professor Zittrain anticipates changes to the Internet regarding quality of service, accounting & traffic management, encryption & security, and authentication in 2004.



<videoflash>iI5HzUX6xkk</videoflash>

  • Professor Zittrain describes the need for new security measures and potential effects on Internet neutrality.



<videoflash>QMxFKmGe46g</videoflash>

  • Professor Zittrain discusses potential changes in hardware and how they will affect control of content.