Lecture 12

From CyberSecurity
Jump to: navigation, search

Incentives to Exploit and Protect

What do we know about the Internet’s vulnerabilities? History of past exploits, worms, viruses. What could a determined, well-funded adversary accomplish?

Speakers

  • Hal Varian, Berkeley, incentive-based strategies for enhancing cyber security
  • Stefan Savage, UCSD, Internet outbreaks: Epidemiology and Defenses
  • Vern Paxson, ICIR and LBNL, Network intrusion detection systems

Readings

Discussion

Participate in the wiki-discussion.