Difference between revisions of "Lecture 7"

From CyberSecurity
Jump to: navigation, search
 
Line 1: Line 1:
 
Using information technology to attack – or to amplify attacks on – various elements of the nation’s critical infrastructure
 
Using information technology to attack – or to amplify attacks on – various elements of the nation’s critical infrastructure
  
 +
==Speakers==
 
Ed Lazowska, UW:  Assessing Cyber-Vulnerabilities:  PITAC and Beyond
 
Ed Lazowska, UW:  Assessing Cyber-Vulnerabilities:  PITAC and Beyond
 
Phil Venables, CISO, Goldman Sachs:  The Resilient Enterprise: Convergence of Security, Compliance, Redundancy and Risky
 
Phil Venables, CISO, Goldman Sachs:  The Resilient Enterprise: Convergence of Security, Compliance, Redundancy and Risky
 
Kirk Bailey, ex-CISO, City of Seattle:  Cyber-attacks and cyber-defense in the City of Seattle
 
Kirk Bailey, ex-CISO, City of Seattle:  Cyber-attacks and cyber-defense in the City of Seattle
 
Ernie Hayden, CISO, Port of Seattle:  Cyber-attacks and cyber-defense at the Port of Seattle
 
Ernie Hayden, CISO, Port of Seattle:  Cyber-attacks and cyber-defense at the Port of Seattle
 +
 +
==Readings==
 +
* [http://www7.nationalacademies.org/cstb/pub_counterterrorism.html Information Technology for Counterterrorism].  Computer Science & Telecommunications Board, National Research Council, 2003. Read the Executive Summary, Chapter 1, Chapter 2, and Chapter 4.
 +
* [http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf Cyber Security:  A Crisis of Prioritization].  President’s Information Technology Advisory Committee, 2005. 
 +
* [http://www.cs.washington.edu/education/courses/csep590/05au/readings/WA.Post.terrorism/ Washington Post articles on cyber terrorism], August 2005.
 +
*New York Times article, “[http://www.cs.washington.edu/education/courses/csep590/05au/readings/nyt.html] The Rise of the Digital Thugs,” August 2005.
 +
*Time article, “[http://www.cs.washington.edu/education/courses/csep590/05au/readings/titan.rain.htm The Invasion of the Chinese Cyberspies],” September 2005.
 +
* [http://www.cio.com/archive/100105/qa_lazowska.html CIO Magazine article], “The Sky Really Is Falling,” October 2005. 
 +
 +
==Discussion==
 +
Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_7 wiki-discussion].
 +
  
 
Readings:
 
Readings:
 
Information Technology for Counterterrorism.  Computer Science & Telecommunications Board, National Research Council, 2003.  http://www7.nationalacademies.org/cstb/pub_counterterrorism.html.  Read the Executive Summary, Chapter 1, Chapter 2, and Chapter 4.
 
Cyber Security:  A Crisis of Prioritization.  President’s Information Technology Advisory Committee, 2005.  http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf (pdf). 
 
Washington Post articles on cyber terrorism, August 2005.  http://www.cs.washington.edu/education/courses/csep590/05au/readings/WA.Post.terrorism/
 
New York Times article, “The Rise of the Digital Thugs,” August 2005.  http://www.cs.washington.edu/education/courses/csep590/05au/readings/nyt.html
 
Time article, “The Invasion of the Chinese Cyberspies,” September 2005.  http://www.cs.washington.edu/education/courses/csep590/05au/readings/titan.rain.htm
 
CIO Magazine article, “The Sky Really Is Falling,” October 2005. 
 
http://www.cio.com/archive/100105/qa_lazowska.html
 

Revision as of 04:39, 13 October 2005

Using information technology to attack – or to amplify attacks on – various elements of the nation’s critical infrastructure

Speakers

Ed Lazowska, UW: Assessing Cyber-Vulnerabilities: PITAC and Beyond Phil Venables, CISO, Goldman Sachs: The Resilient Enterprise: Convergence of Security, Compliance, Redundancy and Risky Kirk Bailey, ex-CISO, City of Seattle: Cyber-attacks and cyber-defense in the City of Seattle Ernie Hayden, CISO, Port of Seattle: Cyber-attacks and cyber-defense at the Port of Seattle

Readings

Discussion

Participate in the wiki-discussion.


Readings: