Difference between revisions of "Lecture 13"
From CyberSecurity
Line 8: | Line 8: | ||
==Readings== | ==Readings== | ||
− | * Will Grover, “All the Easy Experiments: A Berkeley Professor, Dirty Bombs, and the Birth of Informed Consent,” Berkeley Science Review 5:2 (Fall 2005) available at [http://socrates.berkeley.edu:7066/articles/issue9/plutonium.pdf] | + | * Will Grover, “All the Easy Experiments: A Berkeley Professor, Dirty Bombs, and the Birth of Informed Consent,” Berkeley Science Review 5:2 (Fall 2005) available at [http://socrates.berkeley.edu:7066/articles/issue9/plutonium.pdf http://socrates.berkeley.edu:7066/articles/issue9/plutonium.pdf] |
− | * Eric Rescorla, “Is finding security holes a good idea?”, Workshop on Economics and Information Security 2004, May 2004. [http://www.rtfm.com/bugrate.pdf] | + | * Eric Rescorla, “Is finding security holes a good idea?”, Workshop on Economics and Information Security 2004, May 2004. [http://www.rtfm.com/bugrate.pdf http://www.rtfm.com/bugrate.pdf] |
− | * Eric Rescorla, “Security holes... Who cares?” Proceedings of the 12th USENIX Security Conference, August 2003. [http://www.rtfm.com/upgrade.pdf] | + | * Eric Rescorla, “Security holes... Who cares?” Proceedings of the 12th USENIX Security Conference, August 2003. [http://www.rtfm.com/upgrade.pdf http://www.rtfm.com/upgrade.pdf] |
* Andy Ozment, "The Likelihood of Vulnerability Rediscovery and the Social Utility of | * Andy Ozment, "The Likelihood of Vulnerability Rediscovery and the Social Utility of | ||
− | Vulnerability Hunting." [http://www.cl.cam.ac.uk/users/jo262/papers/weis05-ozment-vulnrediscovery.pdf] | + | Vulnerability Hunting." [http://www.cl.cam.ac.uk/users/jo262/papers/weis05-ozment-vulnrediscovery.pdf http://www.cl.cam.ac.uk/users/jo262/papers/weis05-ozment-vulnrediscovery.pdf] |
==Discussion== | ==Discussion== | ||
Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_13 wiki-discussion]. | Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_13 wiki-discussion]. |
Revision as of 04:43, 24 November 2005
Publicity of cyber vulnerabilities; Responses to radiological attack
Speakers
- Steve Maurer, Berkeley, and Matt Coleman, LLNL, Nuclear Fear, Nuclear Evidence: What do we really know about the health effects of radioactivity? How will society react to the possibility (or fact) of a dirty bomb?
- Eric Rescorla, consultant, Looking at the big picture on vulnerabilities.
Readings
- Will Grover, “All the Easy Experiments: A Berkeley Professor, Dirty Bombs, and the Birth of Informed Consent,” Berkeley Science Review 5:2 (Fall 2005) available at http://socrates.berkeley.edu:7066/articles/issue9/plutonium.pdf
- Eric Rescorla, “Is finding security holes a good idea?”, Workshop on Economics and Information Security 2004, May 2004. http://www.rtfm.com/bugrate.pdf
- Eric Rescorla, “Security holes... Who cares?” Proceedings of the 12th USENIX Security Conference, August 2003. http://www.rtfm.com/upgrade.pdf
- Andy Ozment, "The Likelihood of Vulnerability Rediscovery and the Social Utility of
Vulnerability Hunting." http://www.cl.cam.ac.uk/users/jo262/papers/weis05-ozment-vulnrediscovery.pdf
Discussion
Participate in the wiki-discussion.