Difference between revisions of "Lecture 7"
From CyberSecurity
Line 17: | Line 17: | ||
==Discussion== | ==Discussion== | ||
Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_7 wiki-discussion]. | Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_7 wiki-discussion]. | ||
− | |||
− | |||
− |
Latest revision as of 01:38, 20 October 2005
Using information technology to attack – or to amplify attacks on – various elements of the nation’s critical infrastructure
Speakers
Ed Lazowska, UW: Assessing Cyber-Vulnerabilities: PITAC and Beyond Phil Venables, CISO, Goldman Sachs: The Resilient Enterprise: Convergence of Security, Compliance, Redundancy and Risky Kirk Bailey, ex-CISO, City of Seattle: Cyber-attacks and cyber-defense in the City of Seattle Ernie Hayden, CISO, Port of Seattle: Cyber-attacks and cyber-defense at the Port of Seattle
Readings
- Information Technology for Counterterrorism. Computer Science & Telecommunications Board, National Research Council, 2003. Read the Executive Summary, Chapter 1, Chapter 2, and Chapter 4.
- Cyber Security: A Crisis of Prioritization. President’s Information Technology Advisory Committee, 2005.
- Washington Post articles on cyber terrorism, August 2005.
- New York Times article, “[1] The Rise of the Digital Thugs,” August 2005.
- Time article, “The Invasion of the Chinese Cyberspies,” September 2005.
- CIO Magazine article, “The Sky Really Is Falling,” October 2005.
Discussion
Participate in the wiki-discussion.