Lecture 7

From CyberSecurity
Revision as of 04:36, 13 October 2005 by Jbigham (talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Using information technology to attack – or to amplify attacks on – various elements of the nation’s critical infrastructure

Ed Lazowska, UW: Assessing Cyber-Vulnerabilities: PITAC and Beyond Phil Venables, CISO, Goldman Sachs: The Resilient Enterprise: Convergence of Security, Compliance, Redundancy and Risky Kirk Bailey, ex-CISO, City of Seattle: Cyber-attacks and cyber-defense in the City of Seattle Ernie Hayden, CISO, Port of Seattle: Cyber-attacks and cyber-defense at the Port of Seattle

Readings:

Information Technology for Counterterrorism. Computer Science & Telecommunications Board, National Research Council, 2003. http://www7.nationalacademies.org/cstb/pub_counterterrorism.html. Read the Executive Summary, Chapter 1, Chapter 2, and Chapter 4. Cyber Security: A Crisis of Prioritization. President’s Information Technology Advisory Committee, 2005. http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf (pdf). Washington Post articles on cyber terrorism, August 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/WA.Post.terrorism/ New York Times article, “The Rise of the Digital Thugs,” August 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/nyt.html Time article, “The Invasion of the Chinese Cyberspies,” September 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/titan.rain.htm CIO Magazine article, “The Sky Really Is Falling,” October 2005. http://www.cio.com/archive/100105/qa_lazowska.html